CVE-2024-49243

7.5 HIGH

📋 TL;DR

This vulnerability allows attackers to include local files on the server through improper filename control in PHP include/require statements. It affects WordPress sites using the Dynamic Elementor Addons plugin, potentially leading to sensitive information disclosure or code execution. All users of the plugin version 1.0.0 and earlier are affected.

💻 Affected Systems

Products:
  • Dynamic Elementor Addons WordPress Plugin
Versions: n/a through 1.0.0
Operating Systems: Any OS running PHP
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with the vulnerable plugin activated. PHP configuration with allow_url_include disabled does not prevent local file inclusion.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full server compromise through local file inclusion leading to remote code execution, sensitive file disclosure (including configuration files with database credentials), and complete site takeover.

🟠

Likely Case

Sensitive information disclosure (configuration files, source code), limited file reading capabilities, and potential privilege escalation through file manipulation.

🟢

If Mitigated

Limited impact if proper file permissions are set, web server runs with minimal privileges, and sensitive files are stored outside web root.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple HTTP requests can trigger the vulnerability. Public proof-of-concept exists on security research sites.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not available

Vendor Advisory: https://patchstack.com/database/vulnerability/dynamic-elementor-addons/wordpress-dynamic-elementor-addons-plugin-1-0-0-local-file-inclusion-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Deactivate and delete the Dynamic Elementor Addons plugin. 2. Remove all plugin files from wp-content/plugins/dynamic-elementor-addons/. 3. Consider alternative Elementor addon plugins with security updates.

🔧 Temporary Workarounds

Disable Plugin

all

Immediately deactivate the vulnerable plugin to prevent exploitation

wp plugin deactivate dynamic-elementor-addons

Web Application Firewall Rule

all

Block requests containing local file inclusion patterns targeting the plugin

Add WAF rule: Block requests with 'dynamic-elementor-addons' in URL and file path patterns like '../../' or 'php://'

🧯 If You Can't Patch

  • Implement strict file permissions (644 for files, 755 for directories) and run web server with minimal privileges
  • Deploy web application firewall with rules to detect and block local file inclusion attempts

🔍 How to Verify

Check if Vulnerable:

Check if wp-content/plugins/dynamic-elementor-addons/ directory exists and contains version 1.0.0 or earlier files

Check Version:

wp plugin list | grep dynamic-elementor-addons

Verify Fix Applied:

Confirm dynamic-elementor-addons directory is completely removed from wp-content/plugins/

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests containing 'dynamic-elementor-addons' with file path traversal patterns (../../, /etc/passwd, etc.)
  • PHP warnings about failed file inclusions from the plugin directory

Network Indicators:

  • HTTP GET/POST requests to plugin endpoints with file path parameters
  • Unusual file access patterns from web server process

SIEM Query:

source="web_logs" AND (uri="*dynamic-elementor-addons*" AND (uri="*../*" OR uri="*/etc/*" OR uri="*php://*"))

🔗 References

📤 Share & Export