CVE-2024-4779

8.8 HIGH

📋 TL;DR

This vulnerability allows authenticated attackers with contributor-level access or higher to perform SQL injection attacks via the 'data[post_ids][0]' parameter in the Unlimited Elements For Elementor WordPress plugin. Attackers can extract sensitive information from the database by injecting malicious SQL queries. All WordPress sites using vulnerable versions of this plugin are affected.

💻 Affected Systems

Products:
  • Unlimited Elements For Elementor (Free Widgets, Addons, Templates) WordPress plugin
Versions: All versions up to and including 1.5.107
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user with contributor-level privileges or higher. Plugin must be active and vulnerable version installed.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise including extraction of user credentials, sensitive content, and potential privilege escalation leading to full site takeover.

🟠

Likely Case

Data exfiltration of sensitive information from the database, including user data, private content, and configuration details.

🟢

If Mitigated

Limited impact with proper access controls, but still potential for data leakage from accessible database tables.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but uses simple SQL injection techniques. The vulnerability is well-documented in security advisories.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.5.108 or later

Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3090199/unlimited-elements-for-elementor/trunk/provider/functions_wordpress.class.php

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Unlimited Elements For Elementor'. 4. Click 'Update Now' if available. 5. Alternatively, download version 1.5.108+ from WordPress repository and manually update.

🔧 Temporary Workarounds

Disable Plugin

all

Temporarily disable the vulnerable plugin until patched

wp plugin deactivate unlimited-elements-for-elementor

Restrict User Roles

all

Limit contributor and author roles to trusted users only

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block SQL injection patterns
  • Apply principle of least privilege to user accounts and database permissions

🔍 How to Verify

Check if Vulnerable:

Check plugin version in WordPress admin under Plugins → Installed Plugins. Look for Unlimited Elements For Elementor version 1.5.107 or earlier.

Check Version:

wp plugin get unlimited-elements-for-elementor --field=version

Verify Fix Applied:

Confirm plugin version is 1.5.108 or later in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in database logs
  • Multiple failed login attempts followed by successful contributor-level login
  • Requests containing 'data[post_ids][0]' parameter with SQL syntax

Network Indicators:

  • POST requests to WordPress admin-ajax.php or admin-post.php with SQL injection patterns in parameters

SIEM Query:

source="wordpress.log" AND ("data[post_ids][0]" AND (SELECT OR UNION OR -- OR /*))

🔗 References

📤 Share & Export