CVE-2024-47361

6.5 MEDIUM

📋 TL;DR

This CVE describes a Missing Authorization vulnerability in the WPVibes Elementor Addon Elements WordPress plugin. It allows attackers to exploit incorrectly configured access control security levels, potentially accessing restricted functionality. All WordPress sites using affected versions of this plugin are vulnerable.

💻 Affected Systems

Products:
  • WPVibes Elementor Addon Elements WordPress Plugin
Versions: All versions through 1.13.6
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects WordPress installations with the vulnerable plugin installed and activated.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could gain administrative privileges, modify site content, inject malicious code, or access sensitive data depending on what functionality lacks proper authorization checks.

🟠

Likely Case

Unauthorized users accessing restricted plugin features, potentially modifying content or settings they shouldn't have access to.

🟢

If Mitigated

With proper access controls and authentication requirements, impact would be limited to authorized users only.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Missing authorization vulnerabilities typically require minimal technical skill to exploit once the vulnerable endpoint is identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.13.7 or later

Vendor Advisory: https://patchstack.com/database/vulnerability/addon-elements-for-elementor-page-builder/wordpress-elementor-addon-elements-plugin-1-13-6-broken-access-control-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Elementor Addon Elements'. 4. Click 'Update Now' if available. 5. Alternatively, download version 1.13.7+ from WordPress.org and manually update.

🔧 Temporary Workarounds

Disable Plugin

all

Temporarily disable the vulnerable plugin until patched

wp plugin deactivate addon-elements-for-elementor-page-builder

Restrict Access

all

Implement web application firewall rules to block suspicious requests to plugin endpoints

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate affected WordPress instances
  • Enable detailed logging and monitoring for unauthorized access attempts to plugin functionality

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel → Plugins → Elementor Addon Elements → Version. If version is 1.13.6 or earlier, you are vulnerable.

Check Version:

wp plugin get addon-elements-for-elementor-page-builder --field=version

Verify Fix Applied:

After updating, verify plugin version shows 1.13.7 or later in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to plugin-specific endpoints
  • 403/401 errors followed by 200 success codes for same endpoints
  • Unusual user activity from unexpected IP addresses

Network Indicators:

  • HTTP requests to /wp-content/plugins/addon-elements-for-elementor-page-builder/ endpoints without proper authentication headers
  • Unusual traffic patterns to plugin-specific URLs

SIEM Query:

source="wordpress.log" AND ("addon-elements" OR "addon-elements-for-elementor") AND (status=200 OR status=403) AND user="unauthenticated"

🔗 References

📤 Share & Export