The Plus Addons for Elementor Vulnerability – Authenticated (Contributor+) Local File Inclusion via Team Member Listing – CVE-2024-2210 |WordPress Plugin Vulnerability Report

Plugin Name: The Plus Addons for Elementor

Key Information:

  • Software Type: Plugin
  • Software Slug: the-plus-addons-for-elementor-page-builder
  • Software Status: Active
  • Software Author: posimyththemes
  • Software Downloads: 2,111,525
  • Active Installs: 100,000
  • Last Updated: March 26, 2024
  • Patched Versions: Not specified
  • Affected Versions: <= 5.4.1

Vulnerability Details:

  • Name: The Plus Addons for Elementor <= 5.4.1 Authenticated Local File Inclusion via Team Member Listing
  • Type: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
  • CVE: CVE-2024-2210
  • CVSS Score: 6.4
  • Publicly Published: March 26, 2024
  • Researcher: Wesley
  • Description: The Plus Addons for Elementor, a versatile plugin enhancing Elementor with additional widgets and capabilities, has been identified as vulnerable to a Local File Inclusion (LFI) attack. Specifically, the vulnerability exists within the Team Member Listing widget, where insufficient validation of user-supplied input allows attackers with at least contributor-level privileges to include and execute arbitrary files on the server. This vulnerability poses a significant risk as it could lead to unauthorized access, sensitive data exposure, or arbitrary code execution on the affected WordPress sites.


The Plus Addons for Elementor plugin harbors a critical vulnerability in all versions up to and including 5.4.1, enabling authenticated users to exploit Local File Inclusion within the Team Member Listing widget. This security flaw could potentially compromise server integrity and website security, making it imperative for users to apply any available patches or updates promptly.

Detailed Overview:

Discovered by the researcher Wesley, this vulnerability exposes WordPress sites to considerable risk by allowing authenticated attackers to execute PHP code through the inclusion of arbitrary files. This exploit can be particularly damaging if attackers are able to upload files, such as images, that contain malicious PHP code, effectively bypassing security measures designed to limit file uploads to "safe" types. The severity of this issue is underscored by its CVSS score of 6.4, highlighting the need for immediate action to secure affected installations.

Advice for Users:

  • Immediate Action: Users of The Plus Addons for Elementor should immediately seek and apply any available updates or patches for the plugin to mitigate the vulnerability. If no patch is available, consider disabling the affected widget or the plugin entirely until a fix is released.
  • Check for Signs of Vulnerability: Administrators should monitor their sites for unusual activity or unauthorized access, particularly focusing on file uploads and modifications.
  • Alternate Plugins: Given the severity of this vulnerability, users may explore alternative plugins that offer similar functionality but are not affected by this or similar vulnerabilities.
  • Stay Updated: Regularly updating all WordPress components, including plugins, themes, and the core, is essential to maintaining a secure website environment.


The discovery of the Local File Inclusion vulnerability within The Plus Addons for Elementor serves as a critical reminder of the ongoing need for vigilance in the digital realm. Website administrators and users must proactively monitor and update their WordPress installations to safeguard against potential threats. Ensuring that all components are up to date, particularly in light of vulnerabilities like CVE-2024-2210, is fundamental to maintaining the security and integrity of WordPress sites.


Detailed Report: 

In today's digital ecosystem, the security of a website is as crucial as its content and design, particularly for small business owners whose online presence is a pivotal aspect of their operations. The recent identification of a vulnerability in The Plus Addons for Elementor plugin—widely utilized for its rich suite of widgets and enhancements—serves as a poignant reminder of the ever-present threats in the digital realm and the ongoing need for vigilance and proactive security measures.

The Plus Addons for Elementor: A Closer Look

The Plus Addons for Elementor has carved a niche in the WordPress community, amassing over 2 million downloads and supporting 100,000 active installations. Its developer, posimyththemes, has continually updated the plugin, with the latest update recorded on March 26, 2024. Despite its popularity and utility, the plugin was found to be susceptible to a significant security flaw in versions up to and including 5.4.1.

Unpacking the Vulnerability

CVE-2024-2210, as the vulnerability is designated, is a Local File Inclusion (LFI) risk that resides within the plugin's Team Member Listing widget. This flaw allows users with contributor-level access or higher to include and execute arbitrary files on the server. The implications of such an exploit are far-reaching, offering avenues for unauthorized access, sensitive data leakage, or arbitrary code execution, thereby jeopardizing the integrity and security of affected WordPress sites.

Potential Impacts and Risks

The severity of CVE-2024-2210, underscored by a CVSS score of 6.4, cannot be understated. It exposes websites to considerable risk, especially if attackers manage to upload files masquerading as benign images or documents, only to execute malicious PHP code. Such vulnerabilities not only compromise the affected site but can also erode user trust and potentially lead to regulatory and legal repercussions for the site owners.

Remediation and Proactive Measures

In response to this discovery, it is imperative for users of The Plus Addons for Elementor to seek and apply any available patches or updates promptly. In instances where patches are delayed, disabling the affected widget or the entire plugin temporarily might be prudent to mitigate risks. Furthermore, site administrators should remain vigilant, monitoring for unusual activities and reviewing user roles and permissions to prevent unauthorized access.

Historical Context and the Path Forward

This is not the plugin's first brush with vulnerabilities; six previous security issues have been documented since April 13, 2021. This history accentuates the importance of ongoing security assessments and updates. For small business owners, juggling the demands of their enterprises while ensuring their websites are secure might seem daunting. Leveraging automated security tools, subscribing to security advisories, and partnering with web security experts can alleviate some of these burdens, ensuring their digital storefronts remain secure and trustworthy.

In Conclusion

The revelation of vulnerabilities like CVE-2024-2210 in widely used plugins such as The Plus Addons for Elementor is a stark reminder of the dynamic nature of web security threats. Staying informed, adopting proactive security measures, and promptly responding to vulnerabilities are non-negotiable aspects of maintaining a secure online presence. For small business owners, the integrity of their WordPress sites is not just about technology but a cornerstone of their business reputation and the trust they foster with their clientele. In the digital age, vigilance is not just a virtue but a necessity.

Staying Secure

Staying on top of WordPress security can feel overwhelming for small business owners without dedicated IT staff. At Your WP Guy, we exist to shoulder that burden for you. Our WordPress experts can fully audit, secure, maintain and support your site - so you can focus on growing your business with peace of mind.

Don't tackle security risks alone. Let us help you assess any impact from this vulnerability, update your plugins, and implement ongoing maintenance to avoid future threats. We treat your website like it's our own - because we know how critical it is for reaching your customers.

Get in touch for a free consultation today on making WordPress security stress-free. Call 678-995-5169 or book a call here. Our knowledgeable team is ready to help you safeguard your online presence.

The Plus Addons for Elementor Vulnerability – Authenticated (Contributor+) Local File Inclusion via Team Member Listing – CVE-2024-2210 |WordPress Plugin Vulnerability Report FAQs

Leave a Comment