First published: Thu Feb 08 2024(Updated: )
The Royal Elementor Addons and Templates plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.3.87. This is due to missing or incorrect nonce validation on the wpr_update_form_action_meta function. This makes it possible for unauthenticated attackers to post metadata via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Royal Elementor Addons | <1.3.88 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-0511 is classified with a severity that poses significant risk due to Cross-Site Request Forgery vulnerabilities in the affected plugin.
To fix CVE-2024-0511, update the Royal Elementor Addons and Templates plugin to version 1.3.88 or later.
All users of the Royal Elementor Addons and Templates plugin for WordPress versions up to and including 1.3.87 are affected by CVE-2024-0511.
CVE-2024-0511 is a Cross-Site Request Forgery (CSRF) vulnerability resulting from improper nonce validation.
Yes, CVE-2024-0511 can be exploited by unauthenticated users due to the lack of proper nonce validation.