CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
AI Score
Confidence
High
EPSS
Percentile
27.8%
The Plus Addons for Elementor plugin for WordPress is vulnerable to arbitrary file reads in versions up to, and including 4.1.9 (pro) and 2.0.6 (free). The plugin has a feature to add an “Info Box” to an Elementor created page. This Info Box can include an SVG image for the box. Unfortunately, the plugin used file_get_contents with no verification that the file being supplied was an SVG file, so any user with access to the Elementor page builder, such as contributors, could read arbitrary files on the WordPress installation.
Vendor | Product | Version | CPE |
---|---|---|---|
posimyth | the_plus_addons_for_elementor | * | cpe:2.3:a:posimyth:the_plus_addons_for_elementor:*:*:*:*:free:wordpress:*:* |
posimyth | the_plus_addons_for_elementor | * | cpe:2.3:a:posimyth:the_plus_addons_for_elementor:*:*:*:*:pro:wordpress:*:* |
[
{
"vendor": "posimyththemes",
"product": "The Plus Addons for Elementor | FREE Elementor Widgets & Elementor Templates, Header Menu, Blog Post Builder, Dark Mode, Full-Page Scroll, Cross Domain Copy",
"versions": [
{
"version": "*",
"status": "affected",
"lessThanOrEqual": "2.0.6",
"versionType": "semver"
},
{
"version": "*",
"status": "affected",
"lessThanOrEqual": "4.1.9",
"versionType": "semver"
}
],
"defaultStatus": "unaffected"
}
]