CVE-2024-10670

4.3 MEDIUM

📋 TL;DR

The Primary Addon for Elementor WordPress plugin has an information exposure vulnerability that allows authenticated users with Contributor-level access or higher to view private or draft Elementor posts they shouldn't have access to. This affects all WordPress sites using the plugin up to version 1.6.2. Attackers can extract sensitive content from unpublished posts.

💻 Affected Systems

Products:
  • Primary Addon for Elementor WordPress plugin
Versions: All versions up to and including 1.6.2
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress with Elementor and the Primary Addon plugin installed. Vulnerability is present in default configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Sensitive unpublished content (financial data, strategic plans, personal information) is exposed to unauthorized users, potentially leading to data breaches, intellectual property theft, or regulatory violations.

🟠

Likely Case

Unauthorized viewing of draft posts containing sensitive business information, upcoming announcements, or unpublished content that could be used for competitive advantage or social engineering.

🟢

If Mitigated

Minimal impact if proper access controls and user role management are already in place, limiting the number of Contributor-level users.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access with at least Contributor privileges. The vulnerability is straightforward to exploit once authenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.6.3 or later

Vendor Advisory: https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3197298%40primary-addon-for-elementor&new=3197298%40primary-addon-for-elementor&sfp_email=&sfph_mail=

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Primary Addon for Elementor'. 4. Click 'Update Now' if available. 5. Alternatively, download version 1.6.3+ from WordPress.org and manually update.

🔧 Temporary Workarounds

Disable vulnerable shortcode

all

Remove or restrict the [prim_elementor_template] shortcode functionality

Add to theme's functions.php: remove_shortcode('prim_elementor_template');

Restrict user roles

all

Temporarily reduce number of users with Contributor or higher access

🧯 If You Can't Patch

  • Temporarily deactivate the Primary Addon for Elementor plugin
  • Implement additional access controls and audit Contributor-level user activities

🔍 How to Verify

Check if Vulnerable:

Check plugin version in WordPress admin → Plugins → Installed Plugins. If Primary Addon for Elementor is version 1.6.2 or lower, you are vulnerable.

Check Version:

wp plugin list --name='Primary Addon for Elementor' --field=version

Verify Fix Applied:

Confirm plugin version is 1.6.3 or higher in WordPress admin panel. Test that Contributor users cannot access private/draft posts via shortcode.

📡 Detection & Monitoring

Log Indicators:

  • Unusual access patterns to draft/private posts by Contributor users
  • Multiple shortcode requests to restricted content

Network Indicators:

  • HTTP requests containing 'prim_elementor_template' shortcode parameters

SIEM Query:

source="wordpress" AND (shortcode="prim_elementor_template" OR plugin="primary-addon-for-elementor") AND user_role="contributor"

🔗 References

📤 Share & Export