CVE-2024-10798

4.3 MEDIUM

📋 TL;DR

This vulnerability allows authenticated WordPress users with Contributor-level access or higher to extract data from private or draft posts created via Elementor that they should not have access to. It affects the Royal Elementor Addons and Templates plugin due to insufficient restrictions in the 'wpr-template' shortcode. All WordPress sites using vulnerable versions of this plugin are affected.

💻 Affected Systems

Products:
  • Royal Elementor Addons and Templates WordPress Plugin
Versions: All versions up to and including 1.7.1003
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress with the vulnerable plugin installed and at least one authenticated user with Contributor role or higher.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Sensitive information from private posts, draft content, or unpublished material could be exposed to unauthorized users, potentially leading to data leaks, intellectual property theft, or privacy violations.

🟠

Likely Case

Contributors or authors accessing draft posts they shouldn't see, potentially exposing unpublished content, editorial workflows, or sensitive information.

🟢

If Mitigated

Minimal impact with proper user role management and content access controls in place.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access with at least Contributor privileges. The vulnerability is in the shortcode implementation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.7.1004

Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3195352/royal-elementor-addons/tags/1.7.1004/admin/includes/wpr-templates-shortcode.php?old=3193132&old_path=royal-elementor-addons%2Ftags%2F1.7.1003%2Fadmin%2Fincludes%2Fwpr-templates-shortcode.php

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Royal Elementor Addons and Templates'. 4. Click 'Update Now' if available, or download version 1.7.1004 from WordPress repository. 5. Activate the updated plugin.

🔧 Temporary Workarounds

Disable vulnerable shortcode

all

Remove or disable the 'wpr-template' shortcode functionality

Add to theme's functions.php: remove_shortcode('wpr-template');

Restrict user roles

all

Temporarily restrict Contributor and Author access to sensitive areas

Use WordPress role management plugins to limit access

🧯 If You Can't Patch

  • Temporarily deactivate the Royal Elementor Addons plugin
  • Implement strict user role management and audit Contributor/Authors

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Royal Elementor Addons and Templates → Version number

Check Version:

wp plugin list --name='royal-elementor-addons' --field=version

Verify Fix Applied:

Verify plugin version is 1.7.1004 or higher in WordPress admin

📡 Detection & Monitoring

Log Indicators:

  • Unusual shortcode usage patterns
  • Multiple failed access attempts to restricted posts
  • User role escalation attempts

Network Indicators:

  • Unusual API calls to WordPress REST endpoints
  • Suspicious shortcode parameter manipulation

SIEM Query:

source="wordpress" AND (shortcode="wpr-template" OR plugin="royal-elementor-addons")

🔗 References

📤 Share & Export