First published: Wed Jun 07 2023(Updated: )
The Elementor Pro plugin for WordPress is vulnerable to unauthorized data modification due to a missing capability check on the update_page_option function in versions up to, and including, 3.11.6. This makes it possible for authenticated attackers with subscriber-level capabilities to update arbitrary site options, which can lead to privilege escalation.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Elementor Elementor Pro | <3.11.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-3124.
The title of the vulnerability is 'The Elementor Pro plugin for WordPress is vulnerable to unauthorized data modification due to a missing capability check on the update_page_option function in versions up to, and including, 3.11.6.'
The severity of CVE-2023-3124 is high.
CVE-2023-3124 allows authenticated attackers with subscriber-level capabilities to update arbitrary page options in the Elementor Pro plugin for WordPress.
To fix CVE-2023-3124, update the Elementor Pro plugin for WordPress to version 3.11.7 or higher.