CVE-2024-10873

8.8 HIGH

📋 TL;DR

This vulnerability allows authenticated attackers with Contributor-level WordPress access or higher to perform Local File Inclusion via the _load_template function in the LA-Studio Element Kit plugin. Attackers can include and execute arbitrary PHP files on the server, potentially leading to remote code execution, data theft, or privilege escalation. All WordPress sites using this plugin version 1.4.2 or earlier are affected.

💻 Affected Systems

Products:
  • LA-Studio Element Kit for Elementor WordPress plugin
Versions: All versions up to and including 1.4.2
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Contributor-level WordPress user account or higher. WordPress multisite installations are also vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full server compromise through remote code execution, data exfiltration, backdoor installation, and complete site takeover.

🟠

Likely Case

Unauthorized file access, privilege escalation to administrator, and installation of web shells or malware.

🟢

If Mitigated

Limited impact if proper file permissions restrict PHP execution and web application firewalls block malicious requests.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward once credentials are obtained. The vulnerability is in publicly available code.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.4.3 or later

Vendor Advisory: https://wordpress.org/plugins/lastudio-element-kit/#developers

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'LA-Studio Element Kit' and click 'Update Now'. 4. Verify update to version 1.4.3 or higher.

🔧 Temporary Workarounds

Disable vulnerable plugin

all

Temporarily deactivate the LA-Studio Element Kit plugin until patched

wp plugin deactivate lastudio-element-kit

Restrict file uploads

linux

Configure web server to prevent PHP execution in upload directories

Add 'php_flag engine off' to .htaccess in wp-content/uploads

🧯 If You Can't Patch

  • Remove Contributor and higher role access from untrusted users
  • Implement web application firewall rules to block file inclusion patterns

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → LA-Studio Element Kit → Version. If version is 1.4.2 or lower, you are vulnerable.

Check Version:

wp plugin get lastudio-element-kit --field=version

Verify Fix Applied:

After update, confirm version shows 1.4.3 or higher in WordPress plugins list.

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests to /wp-admin/admin-ajax.php with 'action' parameter containing 'lastudio_element_kit' and unusual file paths
  • PHP error logs showing file inclusion errors with user-supplied paths

Network Indicators:

  • POST requests to admin-ajax.php with file path parameters
  • Unusual outbound connections from web server after exploitation

SIEM Query:

source="web_access.log" AND uri="/wp-admin/admin-ajax.php" AND (query="*lastudio_element_kit*" OR query="*load_template*")

🔗 References

📤 Share & Export