CVE-2023-33930

9.1 CRITICAL

📋 TL;DR

This vulnerability allows attackers to upload malicious ZIP files containing dangerous file types to WordPress sites using the Unlimited Elements for Elementor plugin. When extracted, these files can execute arbitrary code, leading to complete site compromise. All WordPress installations with this plugin version 1.5.66 or earlier are affected.

💻 Affected Systems

Products:
  • Unlimited Elements For Elementor (Free Widgets, Addons, Templates)
Versions: n/a through 1.5.66
Operating Systems: All platforms running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all WordPress installations with vulnerable plugin versions regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full server compromise allowing remote code execution, data theft, defacement, and backdoor installation leading to persistent access.

🟠

Likely Case

Website defacement, malware injection, credential theft, and unauthorized administrative access to the WordPress site.

🟢

If Mitigated

Limited impact if file uploads are restricted at web server level, but plugin functionality may be impaired.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only the ability to upload ZIP files through the plugin interface.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.5.67 or later

Vendor Advisory: https://patchstack.com/database/vulnerability/unlimited-elements-for-elementor/wordpress-unlimited-elements-for-elementor-plugin-1-5-66-unrestricted-zip-extraction-vulnerability

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'Unlimited Elements For Elementor'. 4. Click 'Update Now' if available. 5. If no update appears, manually download version 1.5.67+ from WordPress.org and replace plugin files.

🔧 Temporary Workarounds

Disable plugin

all

Temporarily deactivate the Unlimited Elements for Elementor plugin until patched.

wp plugin deactivate unlimited-elements-for-elementor

Restrict ZIP uploads

linux

Block ZIP file uploads at web server level using .htaccess or nginx configuration.

# Apache .htaccess: <Files *.zip> Order Allow,Deny Deny from all </Files>
# Nginx: location ~ \.zip$ { deny all; }

🧯 If You Can't Patch

  • Remove plugin upload functionality by disabling relevant plugin features in WordPress admin
  • Implement web application firewall rules to block malicious ZIP file upload patterns

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin > Plugins > Installed Plugins for Unlimited Elements For Elementor version 1.5.66 or earlier.

Check Version:

wp plugin get unlimited-elements-for-elementor --field=version

Verify Fix Applied:

Verify plugin version is 1.5.67 or later in WordPress admin plugins page.

📡 Detection & Monitoring

Log Indicators:

  • Unusual ZIP file uploads via /wp-admin/admin-ajax.php
  • File write operations to unexpected directories like wp-content/uploads with PHP/executable extensions

Network Indicators:

  • POST requests to /wp-admin/admin-ajax.php with ZIP file attachments
  • Unusual outbound connections from web server after file uploads

SIEM Query:

source="wordpress.log" AND "admin-ajax.php" AND ".zip" AND action="ue_upload_zip_file"

🔗 References

📤 Share & Export