First published: Tue Feb 20 2024(Updated: )
The Royal Elementor Addons and Templates plugin for WordPress is vulnerable to unauthorized post metadata update due to a missing capability check on the wpr_update_form_action_meta function in all versions up to, and including, 1.3.87. This makes it possible for unauthenticated attackers to update certain metadata.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Royal Elementor Addons | <1.3.88 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-0516 is classified as a high severity vulnerability due to the potential for unauthorized post metadata updates.
To fix CVE-2024-0516, update the Royal Elementor Addons plugin to version 1.3.88 or later.
Any user of the Royal Elementor Addons and Templates plugin for WordPress versions up to and including 1.3.87 is affected by CVE-2024-0516.
CVE-2024-0516 enables unauthenticated attackers to modify post metadata due to a missing capability check.
As of now, there are no public exploits specifically reported for CVE-2024-0516, but the vulnerability itself poses a significant risk.