8.8
CVSSv3

CVE-2024-3807

Published: 14/05/2024 Updated: 14/05/2024
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 0

Vulnerability Summary

The Porto theme for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 7.1.0 via 'porto_page_header_shortcode_type', 'slideshow_type' and 'post_layout' post meta. This makes it possible for authenticated attackers, with contributor-level and above permissions, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where php file type can be uploaded and included. This was partially patched in version 7.1.0 and fully patched in version 7.1.1.

Github Repositories

CVE-2024-3806-AND-CVE-2024-3807-Poc CVE-2024-3806: Porto <= 710 - Unauthenticated Local File Inclusion via porto_ajax_posts CVE-2024-3807: Porto <= 710 - Authenticated (Contributor+) Local File Inclusion via Post Meta Porto 710: drivegooglecom/file/d/1BWJ_xfjNetogvfMqKzXtAWEvRJOGa4DF/view?usp=sharing Porto 711: drivegooglecom/file/d/1AQ