CVE-2024-37255
📋 TL;DR
This CVE describes a missing authorization vulnerability in the Wpmet Elements Kit Elementor addons plugin for WordPress. It allows unauthenticated attackers to access functionality that should be restricted by access controls. This affects all WordPress sites using Elements Kit Elementor addons versions up to 3.1.4.
💻 Affected Systems
- Wpmet Elements Kit Elementor addons
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Attackers could modify site content, inject malicious code, or access administrative functions without authentication, potentially leading to complete site compromise.
Likely Case
Unauthenticated attackers can access restricted functionality, potentially modifying content, creating backdoors, or extracting sensitive information.
If Mitigated
With proper network segmentation and web application firewalls, impact is limited to the specific WordPress instance.
🎯 Exploit Status
The vulnerability allows unauthenticated access to restricted endpoints, making exploitation straightforward.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 3.1.5 or later
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins. 3. Find 'Elements Kit Elementor addons'. 4. Click 'Update Now' if available. 5. Alternatively, download version 3.1.5+ from WordPress repository and manually update.
🔧 Temporary Workarounds
Disable vulnerable plugin
allTemporarily disable the Elements Kit Elementor addons plugin until patched
wp plugin deactivate elementskit-lite
Web Application Firewall rule
allBlock access to vulnerable plugin endpoints
Add WAF rule to block requests to /wp-content/plugins/elementskit-lite/* for unauthenticated users
🧯 If You Can't Patch
- Implement strict network segmentation to isolate WordPress instance
- Deploy web application firewall with rules blocking unauthenticated access to plugin endpoints
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin panel > Plugins > Elements Kit Elementor addons version. If version is 3.1.4 or earlier, system is vulnerable.
Check Version:
wp plugin get elementskit-lite --field=version
Verify Fix Applied:
Verify plugin version is 3.1.5 or later in WordPress admin panel.
📡 Detection & Monitoring
Log Indicators:
- Unauthenticated requests to /wp-content/plugins/elementskit-lite/* endpoints
- Multiple 200/403 responses to plugin paths from unauthenticated users
Network Indicators:
- Unusual POST/GET requests to plugin endpoints without authentication headers
- Traffic patterns showing access to admin functions from non-admin IPs
SIEM Query:
source="wordpress.log" AND (uri="/wp-content/plugins/elementskit-lite/*" AND NOT (user!="-" OR user_agent contains "wp-admin"))