CVE-2024-54225

7.5 HIGH

📋 TL;DR

This CVE describes a PHP Local File Inclusion vulnerability in the CodegearThemes Designer WordPress plugin, allowing attackers to include and execute arbitrary local files on the server. It affects all versions up to 1.3.3, potentially leading to remote code execution, data exposure, or system compromise.

💻 Affected Systems

Products:
  • CodegearThemes Designer WordPress Plugin
Versions: n/a through 1.3.3
Operating Systems: Any OS running PHP and WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability is present in default plugin configurations; no special setup required.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to full server compromise, data theft, or malware deployment.

🟠

Likely Case

Sensitive file disclosure (e.g., configuration files) or limited code execution depending on server permissions.

🟢

If Mitigated

Minimal impact if file inclusion is blocked or server permissions restrict access to critical files.

🌐 Internet-Facing: HIGH, as WordPress sites are typically internet-facing and the vulnerability can be exploited remotely.
🏢 Internal Only: MEDIUM, if the plugin is used on internal systems, but exploitation requires network access.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation is straightforward via crafted HTTP requests; public proof-of-concept code is available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.3.4 or later

Vendor Advisory: https://patchstack.com/database/wordpress/plugin/designer/vulnerability/wordpress-designer-plugin-1-3-3-local-file-inclusion-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'Designer' plugin and update to version 1.3.4 or later. 4. Verify update completes successfully.

🔧 Temporary Workarounds

Disable Plugin

all

Temporarily deactivate the Designer plugin to prevent exploitation.

wp plugin deactivate designer

Restrict File Inclusion

linux

Configure PHP settings to disable allow_url_include and restrict file paths.

php_admin_value allow_url_include Off
php_admin_value open_basedir /var/www/html

🧯 If You Can't Patch

  • Implement a web application firewall (WAF) to block malicious requests targeting file inclusion patterns.
  • Monitor server logs for unusual file access attempts and restrict plugin directory permissions.

🔍 How to Verify

Check if Vulnerable:

Check the plugin version in WordPress admin under Plugins > Installed Plugins; if version is 1.3.3 or earlier, it is vulnerable.

Check Version:

wp plugin get designer --field=version

Verify Fix Applied:

After updating, confirm the plugin version is 1.3.4 or later in the WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual HTTP requests with parameters like 'file=' or 'include=' targeting the plugin
  • PHP errors related to file inclusion in server logs

Network Indicators:

  • HTTP requests to plugin endpoints with suspicious file paths in parameters

SIEM Query:

source="web_server_logs" AND (uri="*designer*" AND (param="*file=*" OR param="*include=*"))

🔗 References

📤 Share & Export