The Keap Official Opt-in Forms plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 2.0.1 via the service parameter. This makes it possible for unauthenticated attackers to include PHP files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where PHP files can be uploaded and included. If register_argc_argv is enabled on the server and pearcmd.php is installed, this issue might lead to Remote Code Execution.
History

Fri, 21 Feb 2025 16:15:00 +0000

Type Values Removed Values Added
First Time appeared Keap
Keap keap Official Opt In Forms
CPEs cpe:2.3:a:keap:keap_official_opt_in_forms:*:*:*:*:*:wordpress:*:*
Vendors & Products Keap
Keap keap Official Opt In Forms

Tue, 18 Feb 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 18 Feb 2025 04:30:00 +0000

Type Values Removed Values Added
Description The Keap Official Opt-in Forms plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 2.0.1 via the service parameter. This makes it possible for unauthenticated attackers to include PHP files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where PHP files can be uploaded and included. If register_argc_argv is enabled on the server and pearcmd.php is installed, this issue might lead to Remote Code Execution.
Title Keap Official Opt-in Forms <= 2.0.1 - Unauthenticated Limited Local File Inclusion
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published: 2025-02-18T04:21:16.466Z

Updated: 2025-02-18T15:02:35.921Z

Reserved: 2025-01-24T19:13:27.192Z

Link: CVE-2024-13725

cve-icon Vulnrichment

Updated: 2025-02-18T15:02:19.804Z

cve-icon NVD

Status : Analyzed

Published: 2025-02-18T05:15:18.707

Modified: 2025-02-21T15:56:24.220

Link: CVE-2024-13725

cve-icon Redhat

No data.