CVE-2024-10670
📋 TL;DR
The Primary Addon for Elementor WordPress plugin has an information exposure vulnerability that allows authenticated users with Contributor-level access or higher to view private or draft Elementor posts they shouldn't have access to. This affects all WordPress sites using the plugin up to version 1.6.2. Attackers can extract sensitive content from unpublished posts.
💻 Affected Systems
- Primary Addon for Elementor WordPress plugin
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Sensitive unpublished content (financial data, strategic plans, personal information) is exposed to unauthorized users, potentially leading to data breaches, intellectual property theft, or regulatory violations.
Likely Case
Unauthorized viewing of draft posts containing sensitive business information, upcoming announcements, or unpublished content that could be used for competitive advantage or social engineering.
If Mitigated
Minimal impact if proper access controls and user role management are already in place, limiting the number of Contributor-level users.
🎯 Exploit Status
Exploitation requires authenticated access with at least Contributor privileges. The vulnerability is straightforward to exploit once authenticated.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.6.3 or later
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Primary Addon for Elementor'. 4. Click 'Update Now' if available. 5. Alternatively, download version 1.6.3+ from WordPress.org and manually update.
🔧 Temporary Workarounds
Disable vulnerable shortcode
allRemove or restrict the [prim_elementor_template] shortcode functionality
Add to theme's functions.php: remove_shortcode('prim_elementor_template');
Restrict user roles
allTemporarily reduce number of users with Contributor or higher access
🧯 If You Can't Patch
- Temporarily deactivate the Primary Addon for Elementor plugin
- Implement additional access controls and audit Contributor-level user activities
🔍 How to Verify
Check if Vulnerable:
Check plugin version in WordPress admin → Plugins → Installed Plugins. If Primary Addon for Elementor is version 1.6.2 or lower, you are vulnerable.
Check Version:
wp plugin list --name='Primary Addon for Elementor' --field=version
Verify Fix Applied:
Confirm plugin version is 1.6.3 or higher in WordPress admin panel. Test that Contributor users cannot access private/draft posts via shortcode.
📡 Detection & Monitoring
Log Indicators:
- Unusual access patterns to draft/private posts by Contributor users
- Multiple shortcode requests to restricted content
Network Indicators:
- HTTP requests containing 'prim_elementor_template' shortcode parameters
SIEM Query:
source="wordpress" AND (shortcode="prim_elementor_template" OR plugin="primary-addon-for-elementor") AND user_role="contributor"