CVE-2024-10696
📋 TL;DR
This vulnerability allows authenticated WordPress users with Contributor-level access or higher to view draft, private, and pending posts they shouldn't have access to. It affects all versions of the UltraAddons - Elementor Addons plugin up to 1.1.8 due to missing validation on user-controlled parameters.
💻 Affected Systems
- UltraAddons - Elementor Addons (Header Footer Builder, Custom Font, Custom CSS, Woo Widget, Menu Builder, Anywhere Elementor Shortcode)
📦 What is this software?
Ultraaddons by Codeastrology
⚠️ Risk & Real-World Impact
Worst Case
Sensitive unpublished content could be exposed, potentially revealing confidential business information, upcoming announcements, or private user data before intended publication.
Likely Case
Contributors or authors could view each other's draft posts, potentially leading to information leakage about upcoming content or internal editorial processes.
If Mitigated
With proper access controls and monitoring, impact is limited to unauthorized viewing of unpublished content without modification or deletion capabilities.
🎯 Exploit Status
Exploitation requires authenticated access but is technically simple once authenticated. The vulnerability is well-documented with code references available.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.1.9 or later
Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3158477/ultraaddons-elementor-lite/trunk/inc/wp/shortcode.php
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'UltraAddons - Elementor Addons'. 4. Click 'Update Now' if update is available. 5. Alternatively, download version 1.1.9+ from WordPress.org and manually update.
🔧 Temporary Workarounds
Temporary Plugin Deactivation
allDisable the vulnerable plugin until patched
wp plugin deactivate ultraaddons-elementor-lite
Role Restriction
allTemporarily restrict Contributor and Author roles from accessing sites with sensitive draft content
🧯 If You Can't Patch
- Implement additional access controls using WordPress capabilities management plugins
- Monitor user activity logs for unusual post viewing patterns, especially of draft/private content
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin panel → Plugins → UltraAddons - Elementor Addons → Version. If version is 1.1.8 or lower, you are vulnerable.
Check Version:
wp plugin get ultraaddons-elementor-lite --field=version
Verify Fix Applied:
After updating, verify plugin version shows 1.1.9 or higher in WordPress admin plugins page.
📡 Detection & Monitoring
Log Indicators:
- Unusual access to draft/private/pending posts by users without appropriate permissions
- Multiple GET requests to template endpoints with different ID parameters
Network Indicators:
- HTTP requests to /wp-admin/admin-ajax.php with action=ultraaddons_show_template containing unexpected post IDs
SIEM Query:
source="wordpress.log" AND ("ultraaddons_show_template" OR "show_template") AND status=200 AND user_role IN ("contributor","author")