Platform
wordpress
Component
woolook
Fixed in
1.7.1
CVE-2024-54375 describes a Path Traversal vulnerability within the Woolook WordPress plugin. This flaw allows attackers to include arbitrary files on the server, potentially leading to sensitive data exposure or remote code execution. Versions of Woolook prior to 1.7.1 are affected, and a patch has been released to address the issue.
The Path Traversal vulnerability in Woolook allows an attacker to bypass intended file access restrictions. By manipulating file paths, an attacker can include files outside of the intended directory, such as system files or configuration files. Successful exploitation could lead to the disclosure of sensitive information, such as database credentials or application code. In a worst-case scenario, an attacker could leverage this vulnerability to execute arbitrary PHP code on the server, gaining complete control over the WordPress installation. This is similar to other Local File Inclusion vulnerabilities that have been exploited to compromise WordPress sites.
CVE-2024-54375 was publicly disclosed on December 16, 2024. The vulnerability's severity is considered HIGH (CVSS 7.5). As of this writing, there are no known public exploits or active campaigns targeting this vulnerability. It is not currently listed on the CISA KEV catalog. The ease of exploitation is relatively high due to the common nature of Path Traversal vulnerabilities.
Exploit Status
EPSS
0.33% (56% percentile)
CISA SSVC
CVSS Vector
The primary mitigation for CVE-2024-54375 is to immediately upgrade the Woolook WordPress plugin to version 1.7.1 or later. If upgrading is not immediately feasible due to compatibility concerns or breaking changes, consider implementing a Web Application Firewall (WAF) rule to block requests containing path traversal attempts (e.g., ../ sequences). Additionally, restrict file permissions on sensitive files to prevent unauthorized access. Monitor WordPress access logs for suspicious file inclusion attempts. After upgrading, confirm the vulnerability is resolved by attempting a path traversal request and verifying that access is denied.
Update the Woolook plugin to the latest available version. If no newer version is available, consider disabling or removing the plugin until an update that fixes the vulnerability is released. Consult the plugin documentation or contact the developer for more information.
Vulnerability analysis and critical alerts directly to your inbox.
CVE-2024-54375 is a Path Traversal vulnerability in the Woolook WordPress plugin, allowing attackers to include arbitrary files and potentially execute code.
You are affected if you are using Woolook version 1.7.0 or earlier. Upgrade to version 1.7.1 to mitigate the risk.
Upgrade the Woolook WordPress plugin to version 1.7.1 or later. Consider WAF rules as a temporary workaround if upgrading is not immediately possible.
As of December 2024, there are no confirmed reports of active exploitation, but the vulnerability's ease of exploitation warrants immediate attention.
Refer to the official Woolook plugin documentation and WordPress security announcements for the latest advisory and updates.
Upload your dependency file and we'll tell you instantly if this and other CVEs hit you.
Upload your dependency file and we'll tell you instantly if this and other CVEs hit you.