CVE-2024-56282

7.5 HIGH

📋 TL;DR

This vulnerability allows attackers to include local files on the server through improper filename control in PHP include/require statements. It affects WordPress sites using the WPMozo Addons Lite for Elementor plugin. Attackers can potentially read sensitive files or execute code.

💻 Affected Systems

Products:
  • WPMozo Addons Lite for Elementor
Versions: All versions up to and including 1.1.0
Operating Systems: Any OS running PHP and WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress with Elementor plugin installed. PHP configuration with allow_url_include disabled may limit impact.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete server compromise, data theft, and website defacement.

🟠

Likely Case

Local file inclusion allowing reading of sensitive files like configuration files, potentially leading to credential theft.

🟢

If Mitigated

Limited file access restricted by server permissions, minimal impact with proper file system controls.

🌐 Internet-Facing: HIGH - WordPress plugins are typically internet-facing and this vulnerability can be exploited remotely.
🏢 Internal Only: MEDIUM - Internal systems could be targeted if accessible via internal networks.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires understanding of PHP file inclusion vulnerabilities and WordPress plugin structure.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version after 1.1.0

Vendor Advisory: https://patchstack.com/database/wordpress/plugin/wpmozo-addons-lite-for-elementor/vulnerability/wordpress-wpmozo-addons-lite-for-elementor-plugin-1-1-0-local-file-inclusion-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find WPMozo Addons Lite for Elementor. 4. Click 'Update Now' if available. 5. If no update available, deactivate and remove the plugin.

🔧 Temporary Workarounds

Disable Plugin

WordPress

Temporarily disable the vulnerable plugin until patched version is available.

wp plugin deactivate wpmozo-addons-lite-for-elementor

Restrict File Access

all

Implement web application firewall rules to block suspicious file inclusion patterns.

🧯 If You Can't Patch

  • Remove the WPMozo Addons Lite for Elementor plugin completely
  • Implement strict file system permissions and disable PHP's allow_url_include directive

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Installed Plugins for WPMozo Addons Lite for Elementor version 1.1.0 or earlier.

Check Version:

wp plugin get wpmozo-addons-lite-for-elementor --field=version

Verify Fix Applied:

Verify plugin version is greater than 1.1.0 in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual PHP include/require statements in web server logs
  • Access attempts to sensitive files via plugin endpoints

Network Indicators:

  • HTTP requests with file path traversal patterns to plugin-specific URLs

SIEM Query:

source="web_server" AND (uri="*wpmozo*" AND (uri="*../*" OR uri="*php://*" OR uri="*file=*"))

🔗 References

📤 Share & Export