CVE-2023-5360
📋 TL;DR
This vulnerability in the Royal Elementor Addons and Templates WordPress plugin allows unauthenticated attackers to upload arbitrary files, including PHP shells, leading to remote code execution. It affects WordPress sites using vulnerable versions of this plugin. The high CVSS score reflects the ease of exploitation and severe impact.
💻 Affected Systems
- WordPress Royal Elementor Addons and Templates plugin
📦 What is this software?
Royal Elementor Addons by Royal Elementor Addons
⚠️ Risk & Real-World Impact
Worst Case
Complete server compromise, data theft, malware deployment, and persistent backdoor access leading to full site takeover.
Likely Case
Website defacement, data exfiltration, cryptocurrency mining, or ransomware deployment on vulnerable sites.
If Mitigated
Limited impact if proper file upload restrictions and web application firewalls are in place.
🎯 Exploit Status
Exploit code is publicly available and requires minimal technical skill to execute.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.3.79
Vendor Advisory: https://wordpress.org/plugins/royal-elementor-addons/#developers
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'Royal Elementor Addons and Templates'. 4. Click 'Update Now' if available, or download version 1.3.79+ from WordPress repository. 5. Activate the updated plugin.
🔧 Temporary Workarounds
Disable vulnerable plugin
allTemporarily deactivate the Royal Elementor Addons and Templates plugin until patched.
wp plugin deactivate royal-elementor-addons
Restrict file uploads via .htaccess
linuxBlock PHP file uploads to the vulnerable upload directory.
<FilesMatch "\.(php|php5|php7|phtml|phar)$">
Order Allow,Deny
Deny from all
</FilesMatch>
🧯 If You Can't Patch
- Implement a web application firewall (WAF) with file upload filtering rules.
- Restrict network access to the WordPress admin interface using IP whitelisting.
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin panel > Plugins > Royal Elementor Addons and Templates version number.
Check Version:
wp plugin get royal-elementor-addons --field=version
Verify Fix Applied:
Confirm plugin version is 1.3.79 or higher in WordPress admin.
📡 Detection & Monitoring
Log Indicators:
- Unusual file uploads to /wp-content/uploads/royal-elementor-addons/
- POST requests to /wp-admin/admin-ajax.php with file upload parameters
- Execution of unexpected PHP files in upload directories
Network Indicators:
- HTTP POST requests with file uploads to WordPress admin endpoints from unauthenticated sources
SIEM Query:
source="web_logs" AND (uri_path="/wp-admin/admin-ajax.php" AND method="POST" AND (form_data CONTAINS "file" OR form_data CONTAINS "upload"))
🔗 References
- http://packetstormsecurity.com/files/175992/WordPress-Royal-Elementor-Addons-And-Templates-Remote-Shell-Upload.html
- https://wpscan.com/vulnerability/281518ff-7816-4007-b712-63aed7828b34
- http://packetstormsecurity.com/files/175992/WordPress-Royal-Elementor-Addons-And-Templates-Remote-Shell-Upload.html
- https://wpscan.com/vulnerability/281518ff-7816-4007-b712-63aed7828b34