First published: Fri Aug 30 2024(Updated: )
The Clean Login plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 1.14.5 via the 'template' attribute of the clean-login-register shortcode. This makes it possible for authenticated attackers, with Contributor-level access and above, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Codection Clean Login | <1.14.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-8252 is considered a high severity vulnerability due to its potential for Local File Inclusion allowing unauthorized access to sensitive files.
To fix CVE-2024-8252, update the Clean Login plugin to version 1.14.6 or later to mitigate the Local File Inclusion vulnerability.
Authenticated users with Contributor-level access and above are vulnerable to CVE-2024-8252 if they can exploit the Local File Inclusion flaw.
All versions of the Clean Login plugin up to and including 1.14.5 are affected by CVE-2024-8252.
CVE-2024-8252 is classified as a Local File Inclusion (LFI) vulnerability in the Clean Login plugin for WordPress.