CVE-2024-37092
📋 TL;DR
This vulnerability allows attackers to perform path traversal attacks in the Consulting Elementor Widgets WordPress plugin, leading to local file inclusion. Attackers can read arbitrary files on the server, potentially exposing sensitive information. All WordPress sites using affected versions of this plugin are vulnerable.
💻 Affected Systems
- StylemixThemes Consulting Elementor Widgets WordPress Plugin
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete server compromise through reading sensitive files like wp-config.php (containing database credentials), followed by remote code execution and full site takeover.
Likely Case
Sensitive file disclosure including configuration files, user data, and potentially obtaining credentials that could lead to further compromise.
If Mitigated
Limited information disclosure if file permissions are properly configured and sensitive files are stored outside web root.
🎯 Exploit Status
Path traversal vulnerabilities are typically easy to exploit with publicly available tools and techniques.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.3.1 or later
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'Consulting Elementor Widgets'. 4. Click 'Update Now' if update available. 5. Alternatively, download version 1.3.1+ from WordPress repository and replace plugin files.
🔧 Temporary Workarounds
Disable Plugin
allTemporarily disable the vulnerable plugin until patched
wp plugin deactivate consulting-elementor-widgets
Web Application Firewall Rule
allBlock path traversal patterns in requests
Add WAF rule to block requests containing '../' sequences
🧯 If You Can't Patch
- Remove the Consulting Elementor Widgets plugin completely
- Implement strict file permissions and move sensitive files outside web root
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin > Plugins > Installed Plugins for Consulting Elementor Widgets version 1.3.0 or earlier
Check Version:
wp plugin get consulting-elementor-widgets --field=version
Verify Fix Applied:
Verify plugin version is 1.3.1 or later in WordPress admin panel
📡 Detection & Monitoring
Log Indicators:
- HTTP requests containing '../' sequences to plugin endpoints
- Unusual file read attempts in web server logs
Network Indicators:
- Requests to plugin files with path traversal payloads
SIEM Query:
web.url:*consulting* AND web.url:*../*
🔗 References
- https://patchstack.com/database/vulnerability/consulting-elementor-widgets/wordpress-consulting-elementor-widgets-plugin-1-3-0-local-file-inclusion-vulnerability?_s_id=cve
- https://patchstack.com/database/vulnerability/consulting-elementor-widgets/wordpress-consulting-elementor-widgets-plugin-1-3-0-local-file-inclusion-vulnerability?_s_id=cve