CVE-2024-9538

4.3 MEDIUM

📋 TL;DR

The ShopLentor (WooLentor) WordPress plugin has an information disclosure vulnerability that allows authenticated attackers with Contributor-level access or higher to view private, pending, and draft Elementor template data. This affects all WordPress sites using ShopLentor versions up to 2.9.8. The vulnerability exposes sensitive content that should remain confidential.

💻 Affected Systems

Products:
  • ShopLentor (WooLentor) WordPress Plugin
Versions: All versions up to and including 2.9.8
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress with Elementor and ShopLentor plugin installed. Vulnerability requires authenticated access with Contributor role or higher.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could extract proprietary business templates, unpublished content, or sensitive design elements, potentially enabling intellectual property theft or competitive intelligence gathering.

🟠

Likely Case

Malicious contributors or compromised accounts could view unpublished content and templates, potentially leaking sensitive business information or upcoming marketing campaigns.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to unauthorized viewing of draft content without modification or deletion capabilities.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access. The vulnerability is in the 'render' function in includes/addons/wl_faq.php.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.9.9 or later

Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3164057/woolentor-addons

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'ShopLentor' or 'WooLentor'. 4. Click 'Update Now' if available. 5. Alternatively, download version 2.9.9+ from WordPress repository and manually update.

🔧 Temporary Workarounds

Temporary Plugin Deactivation

all

Disable the ShopLentor plugin until patched

wp plugin deactivate woolentor-addons

Restrict Contributor Access

all

Temporarily elevate Contributor roles or restrict access to sensitive users only

🧯 If You Can't Patch

  • Temporarily deactivate the ShopLentor plugin if business operations allow
  • Implement strict access controls and monitor user activity for suspicious template viewing

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins for ShopLentor/WooLentor version 2.9.8 or lower

Check Version:

wp plugin get woolentor-addons --field=version

Verify Fix Applied:

Verify plugin version is 2.9.9 or higher in WordPress admin panel

📡 Detection & Monitoring

Log Indicators:

  • Unusual access patterns to Elementor template endpoints
  • Multiple requests to wl_faq.php render function from Contributor accounts

Network Indicators:

  • HTTP requests to /wp-content/plugins/woolentor-addons/includes/addons/wl_faq.php with render parameter

SIEM Query:

source="wordpress.log" AND "wl_faq.php" AND "render" AND (user_role="contributor" OR user_role="author" OR user_role="editor")

🔗 References

📤 Share & Export