Lucene search

K
cveWordfenceCVE-2024-2210
HistoryMar 27, 2024 - 3:15 a.m.

CVE-2024-2210

2024-03-2703:15:12
Wordfence
web.nvd.nist.gov
37
cve-2024-2210
wordpress
local file inclusion
team member listing widget
authenticated attackers
contributor-level access
code execution
access controls
sensitive data

CVSS3

6.4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N

AI Score

7.5

Confidence

High

EPSS

0

Percentile

9.0%

The The Plus Addons for Elementor plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 5.4.1 via the Team Member Listing widget. This makes it possible for authenticated attackers, with contributor-level access and above, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included.

Affected configurations

Vulners
Node
posimyththemesthe_plus_addons_for_elementorRange5.4.1wordpress
VendorProductVersionCPE
posimyththemesthe_plus_addons_for_elementor*cpe:2.3:a:posimyththemes:the_plus_addons_for_elementor:*:*:*:*:*:wordpress:*:*

CNA Affected

[
  {
    "vendor": "posimyththemes",
    "product": "The Plus Addons for Elementor",
    "versions": [
      {
        "version": "*",
        "status": "affected",
        "lessThanOrEqual": "5.4.1",
        "versionType": "semver"
      }
    ],
    "defaultStatus": "unaffected"
  }
]

CVSS3

6.4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N

AI Score

7.5

Confidence

High

EPSS

0

Percentile

9.0%