CVE-2024-10356

4.3 MEDIUM

📋 TL;DR

The ElementsReady Addons for Elementor WordPress plugin exposes sensitive template data in versions up to 6.4.8. Authenticated attackers with Contributor-level access or higher can extract private, pending, and draft template information. This affects all WordPress sites using vulnerable versions of this plugin.

💻 Affected Systems

Products:
  • ElementsReady Addons for Elementor WordPress plugin
Versions: All versions up to and including 6.4.8
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with the vulnerable plugin and at least one user with Contributor role or higher.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal unpublished content, proprietary templates, or sensitive information embedded in draft posts, potentially leading to intellectual property theft or content manipulation.

🟠

Likely Case

Malicious contributors or compromised accounts accessing unpublished content they shouldn't have permission to view, violating content confidentiality.

🟢

If Mitigated

Limited exposure with proper user role management and content segregation, though the vulnerability still exists in the code.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is technically simple once credentials are obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.4.9 or later

Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3204333/element-ready-lite

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'ElementsReady Addons for Elementor'. 4. Click 'Update Now' if available. 5. Alternatively, download version 6.4.9+ from WordPress repository and manually update.

🔧 Temporary Workarounds

Temporary Plugin Deactivation

all

Disable the vulnerable plugin until patched

wp plugin deactivate element-ready-lite

Restrict User Roles

all

Temporarily remove Contributor roles or limit user permissions

🧯 If You Can't Patch

  • Implement strict user role management and audit Contributor-level accounts
  • Monitor access logs for unusual template data requests from authenticated users

🔍 How to Verify

Check if Vulnerable:

Check plugin version in WordPress admin under Plugins → Installed Plugins. If version is 6.4.8 or lower, you are vulnerable.

Check Version:

wp plugin get element-ready-lite --field=version

Verify Fix Applied:

Verify plugin version is 6.4.9 or higher after update. Test with Contributor account that sensitive template data is no longer accessible.

📡 Detection & Monitoring

Log Indicators:

  • Unusual GET/POST requests to /wp-content/plugins/element-ready-lite/inc/Widgets/accordion/output/content.php from authenticated users
  • Multiple template data requests from single user session

Network Indicators:

  • Traffic patterns showing repeated access to plugin's content.php file

SIEM Query:

source="wordpress.log" AND (uri_path="*content.php*" AND user_role="contributor" OR user_role="author" OR user_role="editor")

🔗 References

📤 Share & Export