CVE-2024-12102

4.3 MEDIUM

📋 TL;DR

The Typer Core WordPress plugin has an information disclosure vulnerability that allows authenticated users with Contributor-level access or higher to view private or draft posts created with Elementor that they shouldn't have permission to access. This affects all WordPress sites using Typer Core version 1.9.6 or earlier. The vulnerability exists in the 'elementor-template' shortcode implementation.

💻 Affected Systems

Products:
  • Typer Core WordPress Plugin
Versions: All versions up to and including 1.9.6
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress with Elementor and Typer Core plugin installed. Vulnerability only affects authenticated users with Contributor role or higher.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Sensitive information from private posts is exposed to unauthorized users, potentially revealing confidential business plans, unpublished content, or other restricted information.

🟠

Likely Case

Contributors or authors can view draft posts from other users, potentially leading to content theft, unauthorized information gathering, or internal conflicts.

🟢

If Mitigated

With proper user role management and monitoring, impact is limited to minor information leakage that can be detected and addressed.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access with at least Contributor privileges. Attack involves using the vulnerable shortcode to access restricted posts.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.9.7 or later

Vendor Advisory: https://wordpress.org/plugins/typer-core/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find Typer Core plugin. 4. Click 'Update Now' if update is available. 5. Alternatively, download version 1.9.7+ from WordPress.org and manually update.

🔧 Temporary Workarounds

Disable Typer Core Plugin

all

Temporarily disable the vulnerable plugin until patched

wp plugin deactivate typer-core

Restrict User Roles

all

Temporarily restrict Contributor-level access or review user permissions

🧯 If You Can't Patch

  • Implement strict user role management and audit Contributor-level users
  • Monitor for unusual shortcode usage in logs and implement content access controls

🔍 How to Verify

Check if Vulnerable:

Check Typer Core plugin version in WordPress admin under Plugins → Installed Plugins

Check Version:

wp plugin get typer-core --field=version

Verify Fix Applied:

Verify Typer Core version is 1.9.7 or higher after update

📡 Detection & Monitoring

Log Indicators:

  • Unusual shortcode usage patterns
  • Multiple failed access attempts to restricted posts
  • User accessing posts outside their permission level

Network Indicators:

  • HTTP requests containing 'elementor-template' shortcode with unusual parameters

SIEM Query:

source="wordpress" AND (shortcode="elementor-template" OR plugin="typer-core")

🔗 References

📤 Share & Export