CVE-2024-3499
📋 TL;DR
This vulnerability in the ElementsKit Elementor addons plugin for WordPress allows authenticated attackers with contributor-level access or higher to perform Local File Inclusion (LFI) attacks. Attackers can include and execute arbitrary PHP files on the server, potentially leading to remote code execution, data theft, or privilege escalation. All WordPress sites using vulnerable versions of this plugin are affected.
💻 Affected Systems
- ElementsKit Elementor addons plugin for WordPress
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Full server compromise via remote code execution, data exfiltration, backdoor installation, and complete site takeover.
Likely Case
Unauthorized file access, privilege escalation to administrator, and installation of web shells or malware.
If Mitigated
Limited impact if proper file upload restrictions and server hardening are in place, though LFI could still expose sensitive files.
🎯 Exploit Status
Exploitation requires authenticated access but is straightforward once attacker has contributor-level credentials.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 3.1.1
Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3070789/elementskit-lite
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find ElementsKit Elementor addons. 4. Click 'Update Now' if available. 5. Alternatively, download version 3.1.1+ from WordPress repository and manually update.
🔧 Temporary Workarounds
Disable Onepage Scroll Module
allTemporarily disable the vulnerable module until patching is possible
Restrict Contributor Access
allTemporarily remove contributor-level user accounts or restrict their permissions
🧯 If You Can't Patch
- Remove the ElementsKit plugin entirely if not essential
- Implement strict file upload restrictions and disable PHP execution in upload directories
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin → Plugins → ElementsKit → Version number. If version is 3.1.0 or lower, you are vulnerable.
Check Version:
wp plugin list --name=elementskit --field=version
Verify Fix Applied:
Verify plugin version is 3.1.1 or higher in WordPress admin panel.
📡 Detection & Monitoring
Log Indicators:
- Unusual file inclusion requests in web server logs
- Multiple failed authentication attempts followed by successful contributor login
- Requests to wp-content/plugins/elementskit with unusual parameters
Network Indicators:
- POST requests to elementskit endpoints with file path parameters
- Unusual outbound connections from web server after plugin access
SIEM Query:
source="web_server" AND (uri_path="*elementskit*" AND (param="*file*" OR param="*include*"))
🔗 References
- https://plugins.trac.wordpress.org/changeset/3070789/elementskit-lite
- https://www.wordfence.com/threat-intel/vulnerabilities/id/6158ec37-a6fb-42f9-bab6-bf547ea28ea0?source=cve
- https://plugins.trac.wordpress.org/changeset/3070789/elementskit-lite
- https://www.wordfence.com/threat-intel/vulnerabilities/id/6158ec37-a6fb-42f9-bab6-bf547ea28ea0?source=cve