CVE-2024-34551

9.0 CRITICAL

📋 TL;DR

This vulnerability allows unauthenticated attackers to perform path traversal attacks in the Stockholm WordPress theme, leading to local file inclusion. Attackers can read sensitive files on the server, potentially exposing configuration files, credentials, or other sensitive data. All WordPress sites using Stockholm theme versions up to 9.6 are affected.

💻 Affected Systems

Products:
  • Select-Themes Stockholm WordPress Theme
Versions: All versions up to and including 9.6
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with Stockholm theme active. No authentication required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server compromise through reading sensitive files like wp-config.php containing database credentials, followed by database takeover and potential remote code execution.

🟠

Likely Case

Unauthenticated attackers reading sensitive server files, potentially exposing database credentials, configuration files, or other sensitive information that could lead to further attacks.

🟢

If Mitigated

Limited information disclosure if proper file permissions and web server configurations restrict access to sensitive files.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation is straightforward with publicly available proof-of-concept code. Attackers can craft simple HTTP requests to exploit the vulnerability.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 9.7 or later

Vendor Advisory: https://patchstack.com/database/vulnerability/stockholm/wordpress-stockholm-theme-9-6-unauthenticated-local-file-inclusion-vulnerability

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Appearance > Themes. 3. Check for Stockholm theme updates. 4. Update to version 9.7 or later. 5. If no update is available, remove the theme and replace with a secure alternative.

🔧 Temporary Workarounds

Disable Stockholm Theme

all

Temporarily disable the vulnerable theme until patched

wp theme deactivate stockholm

Web Application Firewall Rule

all

Block path traversal patterns in requests

Add WAF rule to block requests containing '../' or similar path traversal sequences

🧯 If You Can't Patch

  • Remove Stockholm theme completely and use a different theme
  • Implement strict file permissions and disable PHP execution in upload directories

🔍 How to Verify

Check if Vulnerable:

Check WordPress theme version in Appearance > Themes or run: wp theme list --field=name,status,version | grep stockholm

Check Version:

wp theme list --field=name,version | grep stockholm

Verify Fix Applied:

Confirm Stockholm theme version is 9.7 or higher: wp theme list --field=name,version | grep stockholm

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests containing '../' sequences targeting Stockholm theme files
  • Multiple 200 OK responses for unexpected file types (like .php, .env, config files)
  • Requests to theme files with unusual parameters

Network Indicators:

  • Unusual file read patterns from web server
  • Requests bypassing normal WordPress routing to access theme files directly

SIEM Query:

source="web_access_logs" AND (url="*stockholm*" AND (url="*../*" OR url="*..\\*" OR url="*%2e%2e%2f*"))

🔗 References

📤 Share & Export