CVE-2024-10787

4.3 MEDIUM

📋 TL;DR

The LA-Studio Element Kit for Elementor WordPress plugin allows authenticated attackers with Contributor-level access or higher to view private and draft posts created by Elementor that they should not have access to. This information exposure vulnerability affects all WordPress sites using this plugin up to version 1.4.4.

💻 Affected Systems

Products:
  • LA-Studio Element Kit for Elementor WordPress plugin
Versions: All versions up to and including 1.4.4
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress with Elementor and the LA-Studio Element Kit plugin installed. Attackers need at least Contributor-level authenticated access.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Sensitive unpublished content, confidential drafts, or proprietary information from private posts could be exposed to unauthorized users, potentially leading to data leaks or intellectual property theft.

🟠

Likely Case

Contributors or authors could view other users' draft or private posts, violating content privacy and potentially exposing sensitive information before publication.

🟢

If Mitigated

With proper user role management and plugin updates, the risk is limited to authorized users who already have some level of access to the WordPress admin.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access with at least Contributor privileges. The vulnerability is in the 'elementor-template' shortcode implementation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 1.4.5 or later

Vendor Advisory: https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3198563%40lastudio-element-kit&new=3198563%40lastudio-element-kit&sfp_email=&sfph_mail=

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'LA-Studio Element Kit for Elementor'. 4. Click 'Update Now' if available, or download version 1.4.5+ from WordPress.org. 5. Activate the updated plugin.

🔧 Temporary Workarounds

Disable vulnerable shortcode

all

Remove or disable the 'elementor-template' shortcode functionality

Edit WordPress theme functions.php or create a custom plugin to remove_shortcode('elementor-template')

Restrict user roles

all

Temporarily limit Contributor and Author role assignments

Use WordPress user management to review and restrict user roles with access to Elementor content

🧯 If You Can't Patch

  • Remove the LA-Studio Element Kit plugin entirely if not essential
  • Implement strict user role management and audit Contributor/Author access regularly

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins for LA-Studio Element Kit version. If version is 1.4.4 or lower, you are vulnerable.

Check Version:

wp plugin list --name='lastudio-element-kit' --field=version (if WP-CLI installed)

Verify Fix Applied:

After updating, verify plugin version shows 1.4.5 or higher in WordPress admin plugins page.

📡 Detection & Monitoring

Log Indicators:

  • Unusual access patterns to private/draft posts by Contributor-level users
  • Multiple requests to elementor-template shortcode endpoints

Network Indicators:

  • HTTP requests containing 'elementor-template' parameters from authenticated users

SIEM Query:

source="wordpress" AND (uri="*elementor-template*" OR user_role="contributor" OR user_role="author") AND status=200

🔗 References

📤 Share & Export