CVE-2024-12102
📋 TL;DR
The Typer Core WordPress plugin has an information disclosure vulnerability that allows authenticated users with Contributor-level access or higher to view private or draft posts created with Elementor that they shouldn't have permission to access. This affects all WordPress sites using Typer Core version 1.9.6 or earlier. The vulnerability exists in the 'elementor-template' shortcode implementation.
💻 Affected Systems
- Typer Core WordPress Plugin
📦 What is this software?
Typer Core by Seventhqueen
⚠️ Risk & Real-World Impact
Worst Case
Sensitive information from private posts is exposed to unauthorized users, potentially revealing confidential business plans, unpublished content, or other restricted information.
Likely Case
Contributors or authors can view draft posts from other users, potentially leading to content theft, unauthorized information gathering, or internal conflicts.
If Mitigated
With proper user role management and monitoring, impact is limited to minor information leakage that can be detected and addressed.
🎯 Exploit Status
Exploitation requires authenticated access with at least Contributor privileges. Attack involves using the vulnerable shortcode to access restricted posts.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.9.7 or later
Vendor Advisory: https://wordpress.org/plugins/typer-core/
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find Typer Core plugin. 4. Click 'Update Now' if update is available. 5. Alternatively, download version 1.9.7+ from WordPress.org and manually update.
🔧 Temporary Workarounds
Disable Typer Core Plugin
allTemporarily disable the vulnerable plugin until patched
wp plugin deactivate typer-core
Restrict User Roles
allTemporarily restrict Contributor-level access or review user permissions
🧯 If You Can't Patch
- Implement strict user role management and audit Contributor-level users
- Monitor for unusual shortcode usage in logs and implement content access controls
🔍 How to Verify
Check if Vulnerable:
Check Typer Core plugin version in WordPress admin under Plugins → Installed Plugins
Check Version:
wp plugin get typer-core --field=version
Verify Fix Applied:
Verify Typer Core version is 1.9.7 or higher after update
📡 Detection & Monitoring
Log Indicators:
- Unusual shortcode usage patterns
- Multiple failed access attempts to restricted posts
- User accessing posts outside their permission level
Network Indicators:
- HTTP requests containing 'elementor-template' shortcode with unusual parameters
SIEM Query:
source="wordpress" AND (shortcode="elementor-template" OR plugin="typer-core")