The Dynamic OOO widget for the Elementor Pro plugin through 3.0.5 for WordPress allows remote authenticated users to execute arbitrary code because only the Editor role is needed to upload executable PHP code via the PHP Raw snippet. NOTE: this issue can be mitigated by removing the Dynamic OOO widget or by restricting availability of the Editor role.
References
Link | Resource |
---|---|
https://elementor.com/pro/changelog/ | Release Notes Vendor Advisory |
https://ww2.compunet.cl/dia-cero-en-plugin-de-wordpres-detectada-compunet-redteam/ | Exploit Third Party Advisory |
https://elementor.com/pro/changelog/ | Release Notes Vendor Advisory |
https://ww2.compunet.cl/dia-cero-en-plugin-de-wordpres-detectada-compunet-redteam/ | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 05:20
Type | Values Removed | Values Added |
---|---|---|
References | () https://elementor.com/pro/changelog/ - Release Notes, Vendor Advisory | |
References | () https://ww2.compunet.cl/dia-cero-en-plugin-de-wordpres-detectada-compunet-redteam/ - Exploit, Third Party Advisory |
Information
Published : 2020-10-07 16:15
Updated : 2024-11-21 05:20
NVD link : CVE-2020-26596
Mitre link : CVE-2020-26596
CVE.ORG link : CVE-2020-26596
JSON object : View
Products Affected
elementor
- elementor_pro
wordpress
- wordpress
CWE
CWE-269
Improper Privilege Management