The Category Ajax Filter plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 2.8.2 via the 'params[caf-post-layout]' parameter. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where files with a .php extension can be uploaded and included.
                
            Metrics
Affected Vendors & Products
References
        History
                    Tue, 15 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | 
        
        
        epss
         
  | 
    
        
        
        epss
         
  | 
Tue, 12 Nov 2024 19:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | 
        
        Trustyplugins
         Trustyplugins category Ajax Filter  | 
|
| CPEs | cpe:2.3:a:trustyplugins:category_ajax_filter:*:*:*:*:*:*:*:* | |
| Vendors & Products | 
        
        Trustyplugins
         Trustyplugins category Ajax Filter  | 
|
| Metrics | 
        
        ssvc
         
  | 
Sat, 09 Nov 2024 07:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | The Category Ajax Filter plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 2.8.2 via the 'params[caf-post-layout]' parameter. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where files with a .php extension can be uploaded and included. | |
| Title | Category Ajax Filter <= 2.8.2 - Unauthenticated Local File Inclusion | |
| Weaknesses | CWE-98 | |
| References | 
         | |
| Metrics | 
        
        cvssV3_1
         
  | 
Status: PUBLISHED
Assigner: Wordfence
Published: 2024-11-09T07:35:03.165Z
Updated: 2024-11-12T18:39:57.920Z
Reserved: 2024-11-05T15:18:14.793Z
Link: CVE-2024-10871
Updated: 2024-11-12T18:39:50.132Z
Status : Awaiting Analysis
Published: 2024-11-09T08:15:04.530
Modified: 2024-11-12T13:56:24.513
Link: CVE-2024-10871
No data.