ElementsKit Elementor Addons Vulnerability – Unauthenticated Information Exposure via ekit_widgetarea_content Function – CVE-2024-6455 | WordPress Plugin Vulnerability Report

Plugin Name: ElementsKit Elementor addons
Key Information:
- Software Type: Plugin
- Software Slug: elementskit-lite
- Software Status: Active
- Software Author: xpeedstudio
- Software Downloads: 21,730,790
- Active Installs: 1,000,000
- Last Updated: July 29, 2024
- Patched Versions: 3.2.1
- Affected Versions: <= 3.2.0
Vulnerability Details:
- Name: ElementsKit Elementor addons <= 3.2.0
- Type: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
- CVE: CVE-2024-6455
- CVSS Score: 5.4
- Publicly Published: July 18, 2024
- Researcher: stealthcopter
- Description: The ElementsKit Elementor addons plugin for WordPress is vulnerable to information exposure in all versions up to and including 3.2.0 due to missing capability checks on the
ekit_widgetarea_content
function. This vulnerability allows unauthenticated attackers to view any content created in Elementor, including posts, pages, templates, drafts, pending, and private items.
Summary:
The ElementsKit Elementor addons plugin for WordPress has a vulnerability in versions up to and including 3.2.0 that allows unauthenticated information exposure. This vulnerability has been patched in version 3.2.1.
Detailed Overview:
The vulnerability was identified by researcher stealthcopter and involves missing capability checks in the ekit_widgetarea_content
function. This oversight allows unauthenticated attackers to access and view various content types created with Elementor, including private and draft posts, which are typically restricted. The exposure of this content can lead to privacy issues and unauthorized dissemination of sensitive information, although it does not provide attackers with direct control over the site.
Advice for Users:
Immediate Action: Users should update the ElementsKit Elementor addons plugin to version 3.2.1 or later to secure their sites from this vulnerability. Check for Signs of Vulnerability: Review your site's content and access logs to ensure that no unauthorized access has occurred. Monitor for unusual activity, such as unexpected views of drafts or private posts. Alternate Plugins: While the issue has been patched, users might consider exploring other Elementor addons with robust security features to mitigate potential risks. Stay Updated: Regularly updating all plugins and the WordPress core is essential to prevent vulnerabilities and maintain site security.
Conclusion:
The swift action by the ElementsKit developers to address this vulnerability highlights the importance of timely updates. Users are strongly encouraged to ensure they are running version 3.2.1 or later to protect their WordPress sites from unauthorized information exposure.