First published: Thu Apr 25 2024(Updated: )
The Essential Addons for Elementor – Best Elementor Templates, Widgets, Kits & WooCommerce Builders plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 5.9.15 via the ajax_load_more() , eael_woo_pagination_product_ajax(), and ajax_eael_product_gallery() functions. This makes it possible for unauthenticated attackers to extract posts that may be in private or draft status.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
WPDeveloper Essential Addons for Elementor | <5.9.16 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-3733 is classified as a high severity vulnerability due to potential sensitive information exposure.
To fix CVE-2024-3733, update the Essential Addons for Elementor plugin to version 5.9.16 or later.
CVE-2024-3733 could expose user data, system information, and potentially configuration details from WordPress installations.
All versions of the Essential Addons for Elementor plugin up to and including version 5.9.15 are affected by CVE-2024-3733.
No, CVE-2024-3733 affects all installations of the affected plugin, regardless of user type.