CVE-2024-35674

4.3 MEDIUM

📋 TL;DR

This CVE describes a Missing Authorization vulnerability in the Unlimited Elements For Elementor WordPress plugin. It allows unauthorized users to access functionality intended only for authenticated users, potentially modifying plugin settings or accessing restricted data. All WordPress sites using affected plugin versions are vulnerable.

💻 Affected Systems

Products:
  • Unlimited Elements For Elementor (Free Widgets, Addons, Templates)
Versions: All versions through 1.5.109
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Affects WordPress installations with the vulnerable plugin enabled. No special configuration required.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Unauthenticated attackers could modify plugin settings, inject malicious content, or access sensitive site configuration data.

🟠

Likely Case

Unauthorized users could change widget settings, modify templates, or access administrative functions they shouldn't have permission to use.

🟢

If Mitigated

With proper authorization controls, only authenticated users with appropriate permissions could access plugin functionality.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Missing authorization vulnerabilities typically require minimal technical skill to exploit once the vulnerable endpoint is identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.5.110 or later

Vendor Advisory: https://patchstack.com/database/vulnerability/unlimited-elements-for-elementor/wordpress-unlimited-elements-for-elementor-plugin-1-5-109-broken-access-control-vulnerability

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Unlimited Elements For Elementor'. 4. Click 'Update Now' if available. 5. Alternatively, download version 1.5.110+ from WordPress.org and manually update.

🔧 Temporary Workarounds

Temporary Plugin Deactivation

all

Disable the vulnerable plugin until patched

wp plugin deactivate unlimited-elements-for-elementor

Access Restriction via .htaccess

linux

Restrict access to plugin directories

Order Deny,Allow
Deny from all

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block unauthorized access to plugin endpoints
  • Restrict plugin functionality to authenticated users only via additional access controls

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Unlimited Elements For Elementor → Version. If version is 1.5.109 or earlier, you are vulnerable.

Check Version:

wp plugin get unlimited-elements-for-elementor --field=version

Verify Fix Applied:

After updating, verify plugin version is 1.5.110 or later in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to /wp-content/plugins/unlimited-elements-for-elementor/ endpoints
  • 403 Forbidden errors from plugin directories

Network Indicators:

  • Unusual POST/GET requests to plugin-specific endpoints from unauthenticated sources

SIEM Query:

source="wordpress.log" AND ("unlimited-elements" OR "uelementor") AND (status=403 OR "unauthorized")

🔗 References

📤 Share & Export