CVE-2023-6743

8.8 HIGH

📋 TL;DR

This vulnerability allows authenticated WordPress users with contributor-level access or higher to execute arbitrary code on the server through the Unlimited Elements For Elementor plugin's template import functionality. All WordPress sites using vulnerable versions of this plugin are affected, potentially enabling attackers to take full control of the web server.

💻 Affected Systems

Products:
  • Unlimited Elements For Elementor (Free Widgets, Addons, Templates) WordPress plugin
Versions: All versions up to and including 1.5.89
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user with at least contributor role. Elementor plugin must be installed but not necessarily active.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server compromise leading to data theft, ransomware deployment, website defacement, and lateral movement to other systems in the network.

🟠

Likely Case

Website defacement, malware injection, credential theft, and backdoor installation for persistent access.

🟢

If Mitigated

Limited impact if proper access controls, network segmentation, and monitoring are in place, though code execution would still be possible.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires contributor-level credentials. Public proof-of-concept code exists in security advisories.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.5.90 and later

Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3015166/unlimited-elements-for-elementor

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Unlimited Elements For Elementor'. 4. Click 'Update Now' if available, or manually update to version 1.5.90+. 5. Verify update completed successfully.

🔧 Temporary Workarounds

Disable plugin

all

Temporarily disable the vulnerable plugin until patching is possible

wp plugin deactivate unlimited-elements-for-elementor

Restrict user roles

all

Remove contributor and author roles from untrusted users

🧯 If You Can't Patch

  • Implement strict access controls: Remove contributor roles from all users, require admin approval for new accounts
  • Enable web application firewall with RCE protection rules and monitor for suspicious file uploads

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Unlimited Elements For Elementor → Version. If version is 1.5.89 or lower, system is vulnerable.

Check Version:

wp plugin get unlimited-elements-for-elementor --field=version

Verify Fix Applied:

Verify plugin version is 1.5.90 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /wp-admin/admin-ajax.php with 'action=unlimited_elements_import_template'
  • Unexpected file creation in wp-content/uploads/unlimited-elements/
  • PHP execution from unusual locations

Network Indicators:

  • HTTP requests containing base64 encoded PHP code in parameters
  • Outbound connections from web server to suspicious IPs

SIEM Query:

source="web_logs" AND (uri_path="/wp-admin/admin-ajax.php" AND parameters CONTAINS "unlimited_elements_import_template")

🔗 References

📤 Share & Export