Arbitrary File Inclusion Vulnerability in Porto Theme's Slideshow Type Post Meta
CVE-2024-3809
8.8HIGH
Summary
The Porto Theme - Functionality plugin for WordPress presents a Local File Inclusion vulnerability in all versions up to and including 3.0.9. This vulnerability arises through the 'slideshow_type' post meta, enabling authenticated users with contributor-level and above permissions to include and execute arbitrary files on the server. This capability poses significant risks, such as unauthorized file execution and potential bypassing of access controls. Exploiting this vulnerability allows attackers to execute any PHP code embedded within the uploaded files, leading to sensitive data exposure and compromise of the website's security.
Affected Version(s)
Porto Theme - Functionality * <= 3.0.9
References
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
István Márton