Exclusive Addons for Elementor Vulnerability – Missing Authorization to Post Duplication – CVE-2024-33914 | WordPress Plugin Vulnerability Report 

Plugin Name: Exclusive Addons for Elementor

Key Information:

  • Software Type: Plugin
  • Software Slug: exclusive-addons-for-elementor
  • Software Status: Active
  • Software Author: timstrifler
  • Software Downloads: 859,237
  • Active Installs: 60,000
  • Last Updated: May 13, 2024
  • Patched Versions:
  • Affected Versions: <=

Vulnerability Details:

  • Name: Exclusive Addons Elementor <=
  • Title: Missing Authorization to Post Duplication
  • Type: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
  • CVE: CVE-2024-33914
  • CVSS Score: 5.4
  • Publicly Published: April 29, 2024
  • Researcher: Khalid
  • Description: The Exclusive Addons Elementor plugin for WordPress is vulnerable to unauthorized access due to an insufficient capability check on the duplicate_post() function in versions up to, and including, This vulnerability allows authenticated attackers, with contributor-level access and above, to duplicate other users' posts, which can lead to information disclosure for private posts.


The Exclusive Addons for Elementor plugin for WordPress has a vulnerability in versions up to and including that allows authenticated contributors to duplicate posts without proper authorization. This vulnerability has been patched in version

Detailed Overview:

This vulnerability was identified by the researcher Khalid and stems from a missing capability check within the duplicate_post() function of the Exclusive Addons Elementor plugin. The flaw allows contributors or higher-level users to duplicate any post, potentially exposing sensitive content marked as private. Such a loophole not only threatens the confidentiality of the content but also undermines the integrity of the site's data management practices. The patch in version rectifies this by implementing proper capability checks to prevent unauthorized post duplication.

Advice for Users:

  • Immediate Action: Update to version immediately to secure your site against this vulnerability.
  • Check for Signs of Vulnerability: Review your website’s post history for any unexpected duplications or changes, which might indicate exploitation of this flaw.
  • Alternate Plugins: If you are concerned about ongoing security with this plugin, consider exploring other reputable plugins that offer similar functionalities with a stronger security track record.
  • Stay Updated: Regularly update all your WordPress plugins and core software to protect against known vulnerabilities and ensure the best performance and security.


The swift action taken by the developers of Exclusive Addons for Elementor to address this vulnerability highlights the importance of responsive and responsible plugin management. Users are advised to ensure they are running the patched version or later to mitigate any potential risks posed by this issue. Maintaining up-to-date systems is essential in safeguarding WordPress installations against potential threats.


Detailed Report: 

In the ever-evolving landscape of digital security, the necessity of keeping your website’s plugins updated cannot be overstated. A stark reminder of this is the recent discovery of a significant vulnerability in the Exclusive Addons for Elementor plugin—a tool utilized by over 60,000 WordPress sites to enhance their content creation capabilities. Identified as CVE-2024-33914, this security flaw allows authenticated users to duplicate posts without proper authorization, potentially leading to unauthorized information disclosure.

Detailed Overview:

This vulnerability was identified by researcher Khalid, who discovered that the plugin lacked adequate capability checks for its duplicate_post() function. This security gap could enable contributors with elevated permissions to replicate and modify posts that should be restricted, posing risks of data leakage and unauthorized content manipulation. The patched version addresses this by enforcing stricter controls to prevent such unauthorized actions.

Risks and Potential Impacts:

Unauthorized post duplication can lead to several security issues, including the disclosure of sensitive or private information contained within posts, undermining the integrity of the website's content management and potentially breaching user trust. The implications of such exposures are especially severe for sites handling sensitive user data or proprietary information.

Overview of Previous Vulnerabilities:

The Exclusive Addons for Elementor plugin has encountered 17 vulnerabilities since December 14, 2022, highlighting a recurring need for updates and security patches to safeguard against evolving threats.


The prompt response by the developers of Exclusive Addons for Elementor to patch this critical vulnerability underscores the importance of maintaining current updates on all WordPress plugins. For small business owners, especially those managing their own WordPress installations, it is vital to prioritize regular updates and security checks. Staying on top of these updates not only protects your data but also ensures a secure and reliable experience for your users.

Staying Secure

Staying on top of WordPress security can feel overwhelming for small business owners without dedicated IT staff. At Your WP Guy, we exist to shoulder that burden for you. Our WordPress experts can fully audit, secure, maintain and support your site - so you can focus on growing your business with peace of mind.

Don't tackle security risks alone. Let us help you assess any impact from this vulnerability, update your plugins, and implement ongoing maintenance to avoid future threats. We treat your website like it's our own - because we know how critical it is for reaching your customers.

Get in touch for a free consultation today on making WordPress security stress-free. Call 678-995-5169 or book a call here. Our knowledgeable team is ready to help you safeguard your online presence.

Exclusive Addons for Elementor Vulnerability – Missing Authorization to Post Duplication – CVE-2024-33914 | WordPress Plugin Vulnerability Report FAQs

Leave a Comment