CVE-2024-2006

8.8 HIGH

📋 TL;DR

This vulnerability allows authenticated WordPress users with contributor-level access or higher to perform PHP object injection through the Post Grid, Slider & Carousel Ultimate plugin. If a POP chain exists via another plugin or theme, attackers could delete files, steal data, or execute arbitrary code. All WordPress sites using vulnerable plugin versions are affected.

💻 Affected Systems

Products:
  • Post Grid, Slider & Carousel Ultimate – with Shortcode, Gutenberg Block & Elementor Widget WordPress plugin
Versions: All versions up to and including 1.6.7
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires contributor-level WordPress user access or higher. Impact depends on presence of POP chains from other plugins/themes.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete site compromise, data theft, and server takeover if a suitable POP chain exists.

🟠

Likely Case

Arbitrary file deletion or sensitive data exposure through available POP chains in common WordPress plugins/themes.

🟢

If Mitigated

Limited impact if no POP chains exist, though object injection still creates security risks.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated access and finding suitable POP chains. Technical details are public but no full exploit is published.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.6.8

Vendor Advisory: https://plugins.trac.wordpress.org/changeset?old_path=/post-grid-carousel-ultimate/tags/1.6.7&old=3045923&new_path=/post-grid-carousel-ultimate/tags/1.6.8&new=3045923

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Post Grid, Slider & Carousel Ultimate'. 4. Click 'Update Now' if available, or delete and reinstall from WordPress repository. 5. Verify version is 1.6.8 or higher.

🔧 Temporary Workarounds

Disable vulnerable plugin

all

Temporarily deactivate the plugin until patched

wp plugin deactivate post-grid-carousel-ultimate

Restrict user roles

all

Limit contributor and higher roles to trusted users only

🧯 If You Can't Patch

  • Disable the Post Grid, Slider & Carousel Ultimate plugin immediately
  • Implement strict access controls and monitor for suspicious activity from contributor+ users

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins for 'Post Grid, Slider & Carousel Ultimate' version 1.6.7 or lower

Check Version:

wp plugin get post-grid-carousel-ultimate --field=version

Verify Fix Applied:

Confirm plugin version is 1.6.8 or higher in WordPress admin

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to wp-admin/admin-ajax.php with 'action' parameter containing 'outpost_shortcode_metabox_markup'
  • PHP deserialization errors in web server logs
  • Unexpected file deletions or modifications by contributor-level users

Network Indicators:

  • HTTP requests with serialized PHP objects in parameters

SIEM Query:

source="wordpress.log" AND "outpost_shortcode_metabox_markup" AND ("unserialize" OR "O:")

🔗 References

📤 Share & Export