The Porto Theme - Functionality plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 3.0.9 via the 'slideshow_type' post meta. This makes it possible for authenticated attackers, with contributor-level and above permissions, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where php file type can be uploaded and included.
Metrics
Affected Vendors & Products
References
History
Thu, 26 Feb 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Portotheme
Portotheme functionality |
|
| CPEs | cpe:2.3:a:portotheme:functionality:*:*:*:*:*:wordpress:*:* | |
| Vendors & Products |
Portotheme
Portotheme functionality |
|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2024-08-01T20:20:02.062Z
Reserved: 2024-04-15T13:16:45.963Z
Link: CVE-2024-3809
Updated: 2024-08-01T20:20:02.062Z
Status : Awaiting Analysis
Published: 2024-05-14T15:42:23.270
Modified: 2024-11-21T09:30:26.640
Link: CVE-2024-3809
No data.