CVE-2024-34554
📋 TL;DR
This vulnerability allows attackers to perform path traversal attacks in the Stockholm Core WordPress plugin, enabling PHP local file inclusion. Attackers can potentially read sensitive files or execute arbitrary code on affected WordPress sites. All WordPress installations using vulnerable versions of Stockholm Core are affected.
💻 Affected Systems
- Select-Themes Stockholm Core WordPress Plugin
📦 What is this software?
Stockholm Core by Select Themes
⚠️ Risk & Real-World Impact
Worst Case
Full server compromise through remote code execution, data exfiltration, and complete site takeover.
Likely Case
Sensitive file disclosure (configuration files, database credentials) and limited code execution within WordPress context.
If Mitigated
Attack blocked at web application firewall level with no successful exploitation.
🎯 Exploit Status
Path traversal vulnerabilities are commonly exploited with simple HTTP requests.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 2.4.2 or later
Vendor Advisory: https://patchstack.com/database/vulnerability/stockholm-core/wordpress-stockholm-core-plugin-2-4-1-local-file-inclusion-vulnerability
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins. 3. Find Stockholm Core plugin. 4. Click 'Update Now' if available. 5. Alternatively, download version 2.4.2+ from WordPress repository and manually update.
🔧 Temporary Workarounds
Web Application Firewall Rule
allBlock path traversal patterns in HTTP requests
WAF-specific configuration required
Disable Plugin
linuxTemporarily disable Stockholm Core plugin until patched
wp plugin deactivate stockholm-core
🧯 If You Can't Patch
- Implement strict file permission controls on web server
- Deploy web application firewall with path traversal detection
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin panel > Plugins > Stockholm Core version
Check Version:
wp plugin get stockholm-core --field=version
Verify Fix Applied:
Confirm Stockholm Core version is 2.4.2 or higher
📡 Detection & Monitoring
Log Indicators:
- HTTP requests with '../' sequences
- Unusual file access patterns in web logs
- Requests to unexpected PHP files
Network Indicators:
- HTTP requests containing path traversal sequences
- Unusual file inclusion attempts
SIEM Query:
web_access_logs WHERE url CONTAINS '../' OR url CONTAINS '..%2F'