First published: Sat Mar 30 2024(Updated: )
The Essential Addons for Elementor plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 5.9.13 via deserialization of untrusted input from the 'error_resetpassword' attribute of the "Login | Register Form" widget (disabled by default). This makes it possible for authenticated attackers, with author-level access and above, to inject a PHP Object. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
WPDeveloper Essential Addons for Elementor | <5.9.14 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-3018 is classified as a critical vulnerability due to its potential for PHP Object Injection.
To fix CVE-2024-3018, update the Essential Addons for Elementor plugin to version 5.9.14 or later.
All versions of the Essential Addons for Elementor plugin up to and including 5.9.13 are affected by CVE-2024-3018.
In the context of CVE-2024-3018, PHP Object Injection allows attackers to exploit deserialized untrusted input, potentially leading to remote code execution.
No, the 'Login | Register Form' widget is disabled by default in the Essential Addons for Elementor plugin.