Platform
wordpress
Component
rehub-theme
Fixed in
19.6.2
CVE-2024-31231 describes a critical Path Traversal vulnerability within the Rehub WordPress plugin. This flaw allows attackers to potentially include arbitrary files on the server, leading to sensitive data exposure or even remote code execution. The vulnerability impacts versions of Rehub up to and including 19.6.1, with a fix released in version 19.6.2.
The core of this vulnerability lies in the improper handling of file paths within the Rehub plugin. An attacker can craft malicious requests that manipulate the pathname, bypassing intended restrictions and accessing files outside the designated directory. Successful exploitation allows for PHP Local File Inclusion (LFI), meaning an attacker can include arbitrary PHP files, potentially executing malicious code on the server. This could lead to complete compromise of the WordPress site, including data theft, modification, or defacement. The blast radius extends to any sensitive data stored on the server, including user credentials, database information, and configuration files. A successful attack could also be used to pivot to other systems on the network if the web server has access to them.
CVE-2024-31231 was publicly disclosed on May 17, 2024. While no active exploitation campaigns have been definitively confirmed, the CRITICAL severity and ease of exploitation suggest a high probability of exploitation. There are currently no publicly available proof-of-concept exploits, but the vulnerability's nature makes it likely that such exploits will emerge. The vulnerability is not currently listed on the CISA KEV catalog.
Exploit Status
EPSS
1.66% (82% percentile)
CISA SSVC
CVSS Vector
The primary mitigation is to immediately upgrade the Rehub plugin to version 19.6.2 or later. If upgrading is not immediately feasible due to compatibility issues or breaking changes, consider implementing temporary workarounds. Restrict file access permissions on the server to minimize the potential impact of a successful exploit. Implement strict input validation to sanitize user-supplied data used in file path construction. Web Application Firewalls (WAFs) can be configured with rules to detect and block malicious requests attempting to exploit this vulnerability. Monitor web server access logs for suspicious file access attempts.
Update the Rehub theme to the latest available version. If no version is available, consider disabling or replacing the theme until an update that fixes the vulnerability is released. Consult the vendor's website for more information and updates.
Vulnerability analysis and critical alerts directly to your inbox.
CVE-2024-31231 is a critical Path Traversal vulnerability in the Rehub WordPress plugin allowing attackers to potentially include arbitrary files, leading to code execution.
If you are using Rehub version 19.6.1 or earlier, you are affected by this vulnerability. Immediate action is required.
Upgrade the Rehub plugin to version 19.6.2 or later to resolve the vulnerability. If upgrading is not possible, implement temporary workarounds like restricting file access.
While no active exploitation campaigns have been confirmed, the CRITICAL severity and ease of exploitation suggest a high probability of exploitation.
Refer to the official Rehub plugin website and WordPress plugin repository for the latest advisory and update information.
Upload your dependency file and we'll tell you instantly if this and other CVEs hit you.
Upload your dependency file and we'll tell you instantly if this and other CVEs hit you.