CVE-2024-5179
📋 TL;DR
The Cowidgets – Elementor Addons WordPress plugin contains a Local File Inclusion vulnerability in all versions up to 1.1.1. Authenticated attackers with Contributor-level access or higher can exploit this to include and execute arbitrary PHP files on the server, potentially leading to remote code execution, data theft, or privilege escalation.
💻 Affected Systems
- Cowidgets – Elementor Addons WordPress plugin
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Full server compromise through remote code execution, data exfiltration, and persistent backdoor installation.
Likely Case
Unauthorized file access, privilege escalation to administrator, and installation of web shells or malware.
If Mitigated
Limited impact if proper file permissions and input validation are in place, but still significant risk.
🎯 Exploit Status
Exploitation requires authenticated access but is straightforward once credentials are obtained.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Version 1.1.2 or later
Vendor Advisory: https://wordpress.org/plugins/cowidgets-elementor-addons/
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Cowidgets – Elementor Addons'. 4. Click 'Update Now' if available. 5. If no update appears, manually download version 1.1.2+ from WordPress.org and replace plugin files.
🔧 Temporary Workarounds
Disable vulnerable plugin
allTemporarily deactivate the Cowidgets plugin until patched.
wp plugin deactivate cowidgets-elementor-addons
Restrict file inclusion paths
linuxConfigure PHP open_basedir restriction to limit file access.
open_basedir = /var/www/html:/tmp
🧯 If You Can't Patch
- Remove Contributor and higher roles from untrusted users.
- Implement web application firewall (WAF) rules to block requests containing 'item_style' or 'style' parameters with path traversal sequences.
🔍 How to Verify
Check if Vulnerable:
Check plugin version in WordPress admin under Plugins → Installed Plugins. If version is 1.1.1 or lower, you are vulnerable.
Check Version:
wp plugin get cowidgets-elementor-addons --field=version
Verify Fix Applied:
Confirm plugin version is 1.1.2 or higher after update.
📡 Detection & Monitoring
Log Indicators:
- HTTP requests containing 'item_style' or 'style' parameters with path traversal sequences (../, ..\)
- Unexpected PHP file inclusions in web server logs
Network Indicators:
- POST requests to /wp-admin/admin-ajax.php with suspicious parameters
- Unusual file upload patterns
SIEM Query:
source="web_server" AND ("item_style" OR "style") AND ("..\" OR "../")
🔗 References
- https://plugins.trac.wordpress.org/browser/cowidgets-elementor-addons/trunk/inc/widgets-manager/widgets/content/class-ce-portfolio-grid.php#L707
- https://plugins.trac.wordpress.org/browser/cowidgets-elementor-addons/trunk/inc/widgets-manager/widgets/content/class-ce-post-navigation.php#L257
- https://plugins.trac.wordpress.org/browser/cowidgets-elementor-addons/trunk/inc/widgets-manager/widgets/content/class-ce-posts-carousel.php#L727
- https://plugins.trac.wordpress.org/browser/cowidgets-elementor-addons/trunk/inc/widgets-manager/widgets/content/class-ce-posts-grid.php#L582
- https://plugins.trac.wordpress.org/browser/cowidgets-elementor-addons/trunk/inc/widgets-manager/widgets/content/class-ce-staff-carousel.php#L603
- https://plugins.trac.wordpress.org/browser/cowidgets-elementor-addons/trunk/inc/widgets-manager/widgets/content/class-ce-testimonial-carousel.php#L600
- https://www.wordfence.com/threat-intel/vulnerabilities/id/ebd6acc9-b7df-4cf8-a211-1e39f3abcf79?source=cve
- https://plugins.trac.wordpress.org/browser/cowidgets-elementor-addons/trunk/inc/widgets-manager/widgets/content/class-ce-portfolio-grid.php#L707
- https://plugins.trac.wordpress.org/browser/cowidgets-elementor-addons/trunk/inc/widgets-manager/widgets/content/class-ce-post-navigation.php#L257
- https://plugins.trac.wordpress.org/browser/cowidgets-elementor-addons/trunk/inc/widgets-manager/widgets/content/class-ce-posts-carousel.php#L727
- https://plugins.trac.wordpress.org/browser/cowidgets-elementor-addons/trunk/inc/widgets-manager/widgets/content/class-ce-posts-grid.php#L582
- https://plugins.trac.wordpress.org/browser/cowidgets-elementor-addons/trunk/inc/widgets-manager/widgets/content/class-ce-staff-carousel.php#L603
- https://plugins.trac.wordpress.org/browser/cowidgets-elementor-addons/trunk/inc/widgets-manager/widgets/content/class-ce-testimonial-carousel.php#L600
- https://www.wordfence.com/threat-intel/vulnerabilities/id/ebd6acc9-b7df-4cf8-a211-1e39f3abcf79?source=cve