ElementsKit Elementor addons and Templates Library Vulnerability – Authenticated Local File Inclusion via Onepage Scroll Module – CVE-2024-3499 | WordPress Plugin Vulnerability Report 

Plugin Name: ElementsKit Elementor addons and Templates Library

Key Information:

  • Software Type: Plugin
  • Software Slug: elementskit-lite
  • Software Status: Active
  • Software Author: xpeedstudio
  • Software Downloads: 19,188,614
  • Active Installs: 1,000,000
  • Last Updated: May 8, 2024
  • Patched Versions: 3.1.1
  • Affected Versions: <= 3.1.0

Vulnerability Details:

  • Name: ElementsKit Elementor addons <= 3.1.0
  • Title: Authenticated (Contributor+) Local File Inclusion via Onepage Scroll Module
  • Type: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE: CVE-2024-3499
  • CVSS Score: 8.8
  • Publicly Published: April 22, 2024
  • Researcher: Webbernaut
  • Description: The ElementsKit Elementor addons plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 3.1.0 via the generate_navigation_markup function of the Onepage Scroll module. This vulnerability allows authenticated attackers, with contributor-level access and above, to include and execute arbitrary files on the server, potentially leading to unauthorized code execution and access to sensitive data.


The ElementsKit Elementor addons and Templates Library for WordPress has a vulnerability in versions up to and including 3.1.0 that allows Local File Inclusion via the Onepage Scroll module's generate_navigation_markup function. This vulnerability has been patched in version 3.1.1.

Detailed Overview:

This vulnerability stems from insufficient input sanitization within the Onepage Scroll module, specifically in its generate_navigation_markup function. The flaw allows authenticated users, such as contributors or higher, to execute arbitrary PHP code on the server by including files that are supposed to be benign, like images, that may contain malicious code. The high CVSS score of 8.8 reflects the severity due to the high potential for unauthorized data access and system control.

Advice for Users:

  • Immediate Action: Update to the patched version, 3.1.1, immediately to close the security gap.
  • Check for Signs of Vulnerability: Monitor your server logs for unexpected file access or include attempts which could suggest exploitation of this vulnerability.
  • Alternate Plugins: While the current vulnerability has been patched, consider using alternate plugins that provide similar functionality but have a stronger security history as a precaution.
  • Stay Updated: Ensure that all your WordPress plugins are regularly updated to the latest versions to mitigate the risk of vulnerabilities.


The prompt update to version 3.1.1 by the ElementsKit developers following the discovery of the vulnerability underscores the critical nature of maintaining updated software on your WordPress site. By updating to the latest patched version, users can safeguard their installations against potential exploits and maintain the security and integrity of their websites.


Detailed Report: 

In the vast landscape of digital platforms, keeping your website secure is not just beneficial—it's essential. A recently discovered vulnerability in the ElementsKit Elementor addons and Templates Library for WordPress serves as a stark reminder of why regular updates are critical. This plugin, popular among over a million users for enhancing their website functionality, was found to have a severe Local File Inclusion (LFI) vulnerability. Such vulnerabilities allow attackers to execute arbitrary code on the server, posing a significant risk to website integrity and user data.

Risks and Potential Impacts:

The implications of this vulnerability are severe, particularly for small businesses that rely on their websites for operations and customer engagement. Unauthorized access could result in stolen data, compromised customer information, or even a complete takeover of the website. This type of security breach could not only disrupt business operations but also damage your brand's reputation and customer trust.

Overview of Previous Vulnerabilities:

The ElementsKit plugin has encountered nine previous vulnerabilities since April 13, 2021, underscoring the ongoing challenges in digital security within plugins and the necessity of regular updates and patches.


For small business owners managing WordPress sites, the discovery of this vulnerability serves as a crucial reminder of the importance of maintaining up-to-date software. Neglecting updates can leave your site exposed to attackers who are constantly scanning for vulnerabilities to exploit. Implementing a routine for regular updates and monitoring your site’s security can save you from potential losses and ensure your digital presence remains secure.

Staying Secure

Staying on top of WordPress security can feel overwhelming for small business owners without dedicated IT staff. At Your WP Guy, we exist to shoulder that burden for you. Our WordPress experts can fully audit, secure, maintain and support your site - so you can focus on growing your business with peace of mind.

Don't tackle security risks alone. Let us help you assess any impact from this vulnerability, update your plugins, and implement ongoing maintenance to avoid future threats. We treat your website like it's our own - because we know how critical it is for reaching your customers.

Get in touch for a free consultation today on making WordPress security stress-free. Call 678-995-5169 or book a call here. Our knowledgeable team is ready to help you safeguard your online presence.

ElementsKit Elementor addons and Templates Library Vulnerability – Authenticated Local File Inclusion via Onepage Scroll Module – CVE-2024-3499 | WordPress Plugin Vulnerability Report FAQs

Leave a Comment