First published: Fri May 10 2024(Updated: )
The Unlimited Elements For Elementor (Free Widgets, Addons, Templates) plugin for WordPress is vulnerable to time-based SQL Injection via the ‘id’ parameter in all versions up to, and including, 1.5.102 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with contributor access or higher, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Unlimited Elements For Elementor | <1.5.105 | |
Unlimited Elements Addon Library for WordPress | <=1.5.102 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-3055 has been classified as a high-severity vulnerability due to the potential for SQL injection exploitation.
To fix CVE-2024-3055, update the Unlimited Elements For Elementor plugin to version 1.5.103 or later.
CVE-2024-3055 affects all versions of the Unlimited Elements For Elementor plugin up to and including 1.5.102.
CVE-2024-3055 can be exploited through a time-based SQL injection using the ‘id’ parameter.
CVE-2024-3055 is a time-based SQL injection vulnerability caused by insufficient input sanitization.