CVE-2024-37410
📋 TL;DR
This path traversal vulnerability in PowerPack Lite for Beaver Builder allows attackers to access files outside the intended directory. It affects WordPress sites using this plugin, potentially exposing sensitive server files. The vulnerability exists in versions up to 1.3.0.3.
💻 Affected Systems
- PowerPack Lite for Beaver Builder
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Attackers could read sensitive server files like configuration files, password files, or source code, potentially leading to complete system compromise.
Likely Case
Unauthorized file reading of web-accessible files, potentially exposing sensitive information like database credentials or user data.
If Mitigated
Limited to reading files within the web server's permissions, with no write or execution capabilities.
🎯 Exploit Status
Path traversal vulnerabilities are commonly exploited and require minimal technical skill.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.3.0.4 or later
Restart Required: No
Instructions:
1. Log into WordPress admin panel
2. Navigate to Plugins > Installed Plugins
3. Find 'PowerPack Lite for Beaver Builder'
4. Click 'Update Now' if update is available
5. Alternatively, download latest version from WordPress repository and manually update
🔧 Temporary Workarounds
Disable vulnerable plugin
allTemporarily disable the PowerPack Lite plugin until patched
Web server path restrictions
linuxConfigure web server to restrict directory traversal attempts
# For Apache: Add to .htaccess
<IfModule mod_rewrite.c>
RewriteEngine On
RewriteCond %{REQUEST_URI} \.\./ [NC,OR]
RewriteCond %{REQUEST_URI} \.\.\\ [NC]
RewriteRule .* - [F]
</IfModule>
🧯 If You Can't Patch
- Remove or disable the PowerPack Lite plugin entirely
- Implement web application firewall (WAF) rules to block path traversal patterns
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin panel > Plugins > Installed Plugins for PowerPack Lite version
Check Version:
# In WordPress admin URL: /wp-admin/plugins.php
Verify Fix Applied:
Verify plugin version is 1.3.0.4 or higher in WordPress admin
📡 Detection & Monitoring
Log Indicators:
- HTTP requests containing '../' or '..\' patterns
- Requests to unusual file paths in plugin directory
Network Indicators:
- HTTP requests with path traversal sequences in URL parameters
SIEM Query:
http.url:*../* OR http.uri:*..\\*
🔗 References
- https://patchstack.com/database/vulnerability/powerpack-addon-for-beaver-builder/wordpress-powerpack-lite-for-beaver-builder-plugin-1-3-0-3-local-file-inclusion-vulnerability?_s_id=cve
- https://patchstack.com/database/vulnerability/powerpack-addon-for-beaver-builder/wordpress-powerpack-lite-for-beaver-builder-plugin-1-3-0-3-local-file-inclusion-vulnerability?_s_id=cve