CVE-2024-9889

4.3 MEDIUM

📋 TL;DR

The ElementInvader Addons for Elementor WordPress plugin has an information disclosure vulnerability that allows authenticated users with contributor-level access or higher to view private, draft, password-protected posts, pages, and Elementor templates they shouldn't have access to. This affects all WordPress sites using this plugin up to version 1.2.9.

💻 Affected Systems

Products:
  • ElementInvader Addons for Elementor WordPress plugin
Versions: All versions up to and including 1.2.9
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress with Elementor and the vulnerable plugin installed. Only affects sites with contributor-level users or higher.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Malicious contributor-level users could access sensitive unpublished content, proprietary information, or embargoed materials, potentially leading to data leaks, intellectual property theft, or regulatory violations.

🟠

Likely Case

Internal users with contributor access could accidentally or intentionally view content they shouldn't see, potentially exposing draft content, unpublished announcements, or sensitive internal documents.

🟢

If Mitigated

With proper user access controls and monitoring, the impact is limited to potential unauthorized viewing of non-critical draft content by trusted users.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access with contributor privileges or higher. The vulnerability is in the Page Loader widget functionality.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 1.3.0 or later

Vendor Advisory: https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3171339%40elementinvader-addons-for-elementor&new=3171339%40elementinvader-addons-for-elementor&sfp_email=&sfph_mail=

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Go to Plugins → Installed Plugins. 3. Find 'ElementInvader Addons for Elementor'. 4. Click 'Update Now' if update is available. 5. Alternatively, download version 1.3.0+ from WordPress.org and manually update.

🔧 Temporary Workarounds

Disable Page Loader Widget

all

Temporarily disable the vulnerable Page Loader widget until patching is possible

Navigate to WordPress admin → Elementor → Settings → Advanced → Disable 'ElementInvader Page Loader' widget

Remove Contributor Access

all

Temporarily restrict contributor-level access to sensitive sites

Navigate to WordPress admin → Users → Edit user roles → Remove contributor access from untrusted users

🧯 If You Can't Patch

  • Immediately remove the ElementInvader Addons for Elementor plugin completely
  • Implement strict user access controls and monitor contributor-level user activity closely

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → ElementInvader Addons for Elementor → Version. If version is 1.2.9 or lower, you are vulnerable.

Check Version:

wp plugin list --name='elementinvader-addons-for-elementor' --field=version

Verify Fix Applied:

Verify plugin version is 1.3.0 or higher in WordPress admin panel. Test that contributor users cannot access private/draft content through Page Loader widget.

📡 Detection & Monitoring

Log Indicators:

  • Unusual access patterns to private/draft posts by contributor-level users
  • Multiple failed access attempts to protected content followed by successful access

Network Indicators:

  • HTTP requests to WordPress admin-ajax.php or REST API endpoints with contributor credentials accessing private content endpoints

SIEM Query:

source="wordpress" (user_role="contributor" OR user_role="author" OR user_role="editor") AND (uri_path="*private*" OR uri_path="*draft*" OR uri_path="*protected*")

🔗 References

📤 Share & Export