First published: Wed Jan 15 2025(Updated: )
The Elementor Addon Elements plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.13.10 via the 'render' function in modules/modal-popup/widgets/modal-popup.php. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract sensitive private, pending, scheduled, and draft template data.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
WordPress Elementor Addon Elements | <=1.13.10 | |
webtechstreet Elementor Addon Elements | <1.14 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-13215 has a high severity level due to its potential for sensitive information exposure.
To fix CVE-2024-13215, update the Elementor Addon Elements plugin to version 1.14 or higher.
CVE-2024-13215 affects all versions of the Elementor Addon Elements plugin up to and including version 1.13.10.
CVE-2024-13215 is classified as a Sensitive Information Exposure vulnerability.
Yes, CVE-2024-13215 can be exploited by authenticated attackers with Contributor-level access.