CVE-2024-5153

9.1 CRITICAL

📋 TL;DR

The Startklar Elementor Addons WordPress plugin contains a directory traversal vulnerability that allows unauthenticated attackers to read arbitrary files and delete directories on the server. This affects all WordPress sites using this plugin up to version 1.7.15. Attackers can potentially access sensitive configuration files, database credentials, and delete critical WordPress directories.

💻 Affected Systems

Products:
  • Startklar Elementor Addons WordPress Plugin
Versions: All versions up to and including 1.7.15
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all WordPress installations with the vulnerable plugin active. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete site compromise via sensitive file disclosure (wp-config.php with database credentials) followed by deletion of the entire WordPress installation directory, causing permanent data loss and site destruction.

🟠

Likely Case

Unauthenticated attackers exfiltrate sensitive configuration files containing database credentials, leading to database compromise and potential site takeover.

🟢

If Mitigated

Limited impact if proper file permissions restrict access to sensitive files and regular backups exist, though directory deletion could still cause service disruption.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending specially crafted requests to the vulnerable endpoint with directory traversal sequences in the 'dropzone_hash' parameter.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.7.16 or later

Vendor Advisory: https://plugins.trac.wordpress.org/browser/startklar-elmentor-forms-extwidgets

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Startklar Elementor Addons'. 4. Click 'Update Now' if update available. 5. If no update available, deactivate and delete the plugin immediately.

🔧 Temporary Workarounds

Disable Plugin

all

Deactivate the vulnerable plugin to prevent exploitation

wp plugin deactivate startklar-elmentor-forms-extwidgets

Web Application Firewall Rule

linux

Block requests containing directory traversal sequences in the dropzone_hash parameter

ModSecurity rule: SecRule ARGS:dropzone_hash "\.\./" "id:1001,phase:2,deny,status:403,msg:'Directory Traversal Attempt'

🧯 If You Can't Patch

  • Deactivate the Startklar Elementor Addons plugin immediately
  • Implement strict file permissions (chmod 600 for sensitive files like wp-config.php)

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel → Plugins → Installed Plugins for 'Startklar Elementor Addons' version 1.7.15 or earlier

Check Version:

wp plugin list --name=startklar-elmentor-forms-extwidgets --field=version

Verify Fix Applied:

Verify plugin version is 1.7.16 or later in WordPress admin panel

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests to /wp-content/plugins/startklar-elmentor-forms-extwidgets/widgets/dropzone_form_field.php with 'dropzone_hash' parameter containing '../' sequences
  • Unusual file read operations in web server logs
  • Directory deletion attempts

Network Indicators:

  • POST requests to vulnerable endpoint with traversal payloads
  • Unusual outbound traffic containing file contents

SIEM Query:

source="web_server_logs" AND uri="*dropzone_form_field.php*" AND (query="*../*" OR post_data="*../*")

🔗 References

📤 Share & Export