First published: Thu Jan 11 2024(Updated: )
The ElementsKit Elementor addons plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 3.0.3 via the ekit_widgetarea_content function. This makes it possible for unauthenticated attackers to obtain contents of posts in draft, private or pending review status that should not be visible to the general public. This applies to posts created with Elementor only.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Wpmet ElementsKit Elementor Addons | <3.0.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-6582 is classified as a moderate severity vulnerability due to the potential for sensitive information exposure.
To fix CVE-2023-6582, update the ElementsKit Elementor Addons plugin to version 3.0.4 or later.
CVE-2023-6582 affects all versions of the ElementsKit Elementor Addons plugin for WordPress up to and including 3.0.3.
CVE-2023-6582 can lead to the exposure of contents from posts marked as draft, private, or pending.
No, CVE-2023-6582 can be exploited by unauthenticated attackers.