First published: Fri Jun 21 2024(Updated: )
The WP Blog Post Layouts plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 1.1.3. This makes it possible for authenticated attackers, with Contributor-level access and above, to include and execute arbitrary PHP files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Codevibrant WP Blog Post Layouts | <=1.1.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-5503 is considered a high severity vulnerability due to the potential for authenticated attackers to execute arbitrary PHP files.
To fix CVE-2024-5503, users should update the WP Blog Post Layouts plugin to the latest version beyond 1.1.3.
CVE-2024-5503 affects all versions of the WP Blog Post Layouts plugin up to and including version 1.1.3.
CVE-2024-5503 enables local file inclusion attacks for authenticated users with Contributor-level access and above.
Yes, CVE-2024-5503 can potentially lead to remote code execution if an attacker leverages the local file inclusion vulnerability successfully.