CVE-2024-1358

8.8 HIGH

📋 TL;DR

The Elementor Addon Elements WordPress plugin has a directory traversal vulnerability in its render function. Authenticated attackers with contributor-level access or higher can exploit this to read arbitrary PHP files on the server, potentially exposing sensitive information like configuration files or credentials. This affects all versions up to and including 1.12.12.

💻 Affected Systems

Products:
  • Elementor Addon Elements for WordPress
Versions: All versions up to and including 1.12.12
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user with at least contributor-level permissions. WordPress multisite installations are also affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could read sensitive files like wp-config.php containing database credentials, leading to full site compromise, data theft, or server takeover.

🟠

Likely Case

Attackers with contributor access read configuration files to obtain database credentials, then escalate privileges or exfiltrate sensitive data.

🟢

If Mitigated

With proper access controls and file permissions, impact is limited to reading non-sensitive PHP files or triggering errors.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires contributor-level access. Public proof-of-concept code is available in vulnerability reports.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.12.13 and later

Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3037925/addon-elements-for-elementor-page-builder/trunk/modules/shape-separator/widgets/shape-separator.php

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Addon Elements for Elementor'. 4. Click 'Update Now' if update is available. 5. Alternatively, download version 1.12.13+ from WordPress.org and manually update.

🔧 Temporary Workarounds

Disable vulnerable plugin

all

Temporarily deactivate the Addon Elements plugin until patched

wp plugin deactivate addon-elements-for-elementor-page-builder

Restrict contributor access

all

Temporarily remove contributor role permissions or limit contributor accounts

🧯 If You Can't Patch

  • Implement strict file permissions (e.g., 600 for sensitive files like wp-config.php)
  • Add web application firewall rules to block directory traversal patterns

🔍 How to Verify

Check if Vulnerable:

Check plugin version in WordPress admin under Plugins → Installed Plugins. If version is 1.12.12 or lower, you are vulnerable.

Check Version:

wp plugin get addon-elements-for-elementor-page-builder --field=version

Verify Fix Applied:

After updating, verify plugin version shows 1.12.13 or higher in WordPress admin.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file access patterns in web server logs, especially requests containing '../' sequences to PHP files
  • Multiple failed attempts to access sensitive files from contributor-level accounts

Network Indicators:

  • HTTP requests with directory traversal payloads (e.g., '../../wp-config.php') to the shape separator endpoint

SIEM Query:

source="web_logs" AND (uri="*../*" OR uri="*..%2f*") AND uri="*.php" AND user_agent="*WordPress*"

🔗 References

📤 Share & Export