First published: Tue Feb 01 2022(Updated: )
The Essential Addons for Elementor WordPress plugin before 5.0.5 does not validate and sanitise some template data before it them in include statements, which could allow unauthenticated attackers to perform Local File Inclusion attack and read arbitrary files on the server, this could also lead to RCE via user uploaded files or other LFI to RCE techniques.
Credit: contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
Wpdeveloper Essential Addons For Elementor | <5.0.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-0320 is critical with a severity value of 9.8.
An attacker can exploit CVE-2022-0320 by performing a Local File Inclusion attack and reading arbitrary files on the server.
The Essential Addons for Elementor WordPress plugin before version 5.0.5 is affected by CVE-2022-0320.
To fix CVE-2022-0320, update the Essential Addons for Elementor WordPress plugin to version 5.0.5 or later.
You can find more information about CVE-2022-0320 at the following reference: [https://wpscan.com/vulnerability/0d02b222-e672-4ac0-a1d4-d34e1ecf4a95](https://wpscan.com/vulnerability/0d02b222-e672-4ac0-a1d4-d34e1ecf4a95).