First published: Thu May 02 2024(Updated: )
The ElementsKit Pro plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 3.6.0 via the Price Menu, Hotspot, and Advanced Toggle widgets. This makes it possible for authenticated attackers, with contributor-level access and above, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
ElementsKit | <3.6.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-3500 is rated as a high severity vulnerability due to its potential for local file inclusion exploits.
To remediate CVE-2024-3500, update the ElementsKit Pro plugin to version 3.6.1 or later.
CVE-2024-3500 affects authenticated users with contributor-level access and above using ElementsKit Pro plugin versions up to 3.6.0.
CVE-2024-3500 impacts the Price Menu, Hotspot, and Advanced Toggle widgets of the ElementsKit Pro plugin.
Yes, the vulnerability CVE-2024-3500 is resolved in ElementsKit Pro version 3.6.1.