CVE-2024-33541
📋 TL;DR
This vulnerability allows attackers to read arbitrary files on the server through path traversal in the Better Elementor Addons WordPress plugin. It affects all WordPress sites using this plugin from any version up to 1.4.1. Attackers can potentially access sensitive files like configuration files or source code.
💻 Affected Systems
- Better Elementor Addons WordPress Plugin
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete server compromise through reading sensitive configuration files (like wp-config.php containing database credentials), followed by database access and potential remote code execution.
Likely Case
Information disclosure of sensitive files, potentially exposing database credentials, user data, or other configuration secrets.
If Mitigated
Limited impact if proper file permissions restrict access to sensitive files and web server runs with minimal privileges.
🎯 Exploit Status
Path traversal vulnerabilities are typically easy to exploit with simple HTTP requests.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.4.2 or later
Vendor Advisory: https://patchstack.com/database/vulnerability/better-elementor-addons/wordpress-better-elementor-addons-plugin-1-4-1-local-file-inclusion-vulnerability
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Go to Plugins → Installed Plugins. 3. Find 'Better Elementor Addons'. 4. Click 'Update Now' if update is available. 5. Alternatively, download version 1.4.2+ from WordPress.org and manually update.
🔧 Temporary Workarounds
Disable Plugin
allTemporarily disable the vulnerable plugin until patched
Web Application Firewall Rule
allBlock requests containing path traversal patterns to the plugin endpoints
🧯 If You Can't Patch
- Remove or disable the Better Elementor Addons plugin immediately
- Implement strict file permissions (chmod 600 for sensitive files, web server running as non-privileged user)
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin → Plugins → Better Elementor Addons → Version. If version is 1.4.1 or lower, you are vulnerable.
Check Version:
wp plugin list --name=better-elementor-addons --field=version
Verify Fix Applied:
After updating, verify plugin version shows 1.4.2 or higher in WordPress admin panel.
📡 Detection & Monitoring
Log Indicators:
- HTTP requests to /wp-content/plugins/better-elementor-addons/ with ../ patterns
- Unusual file access patterns in web server logs
Network Indicators:
- HTTP requests containing path traversal sequences (../, ..\, %2e%2e%2f) to plugin endpoints
SIEM Query:
web.url:*better-elementor-addons* AND (web.url:*..%2f* OR web.url:*..\* OR web.url:*%2e%2e%2f*)
🔗 References
- https://patchstack.com/database/vulnerability/better-elementor-addons/wordpress-better-elementor-addons-plugin-1-4-1-local-file-inclusion-vulnerability?_s_id=cve
- https://patchstack.com/database/vulnerability/better-elementor-addons/wordpress-better-elementor-addons-plugin-1-4-1-local-file-inclusion-vulnerability?_s_id=cve