CVE-2024-10365

4.3 MEDIUM

📋 TL;DR

This vulnerability allows authenticated WordPress users with Contributor-level access or higher to extract sensitive private, pending, and draft template data from the The Plus Addons for Elementor plugin. The exposure occurs through multiple widget modules, potentially revealing unpublished content and template information. All WordPress sites using vulnerable versions of this plugin are affected.

💻 Affected Systems

Products:
  • The Plus Addons for Elementor – Elementor Addons, Page Templates, Widgets, Mega Menu, WooCommerce
Versions: All versions up to and including 6.0.3
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with the vulnerable plugin and at least one authenticated user with Contributor role or higher.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal unpublished content, proprietary templates, and sensitive draft materials, potentially leading to intellectual property theft, content plagiarism, or exposure of confidential business information before publication.

🟠

Likely Case

Malicious contributors or compromised accounts could exfiltrate draft posts, private templates, and unpublished content, enabling content theft or competitive intelligence gathering.

🟢

If Mitigated

With proper access controls and monitoring, the impact is limited to potential exposure of draft content that should have been restricted to higher-privileged users.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access with at least Contributor privileges. The vulnerability is in multiple widget modules including tp_carousel_anything.php and tp_page_scroll.php.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.0.4 or later

Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3186482/the-plus-addons-for-elementor-page-builder

Restart Required: No

Instructions:

1. Log into WordPress admin panel
2. Navigate to Plugins → Installed Plugins
3. Find 'The Plus Addons for Elementor'
4. Click 'Update Now' if available
5. Alternatively, download version 6.0.4+ from WordPress.org and manually update

🔧 Temporary Workarounds

Temporary Plugin Deactivation

all

Disable the vulnerable plugin until patched

wp plugin deactivate the-plus-addons-for-elementor

Role Restriction

all

Temporarily restrict Contributor role access or reduce privileges

Use WordPress role management plugins or custom code to limit Contributor capabilities

🧯 If You Can't Patch

  • Implement strict access controls and monitor Contributor-level user activities
  • Regularly audit user accounts and remove unnecessary Contributor privileges

🔍 How to Verify

Check if Vulnerable:

Check plugin version in WordPress admin under Plugins → Installed Plugins. If version is 6.0.3 or lower, you are vulnerable.

Check Version:

wp plugin get the-plus-addons-for-elementor --field=version

Verify Fix Applied:

Verify plugin version is 6.0.4 or higher in WordPress admin panel. Test that Contributor users cannot access draft/private template data.

📡 Detection & Monitoring

Log Indicators:

  • Unusual access patterns to draft/private content by Contributor users
  • Multiple failed attempts to access restricted template endpoints

Network Indicators:

  • Unusual outbound traffic containing template/draft data from Contributor accounts

SIEM Query:

source="wordpress" AND (uri_path CONTAINS "tp_carousel_anything" OR uri_path CONTAINS "tp_page_scroll") AND user_role="contributor" AND response_status=200

🔗 References

📤 Share & Export