The Plus Addons for Elementor plugin for WordPress is vulnerable to arbitrary file reads in versions up to, and including 4.1.9 (pro) and 2.0.6 (free). The plugin has a feature to add an "Info Box" to an Elementor created page. This Info Box can include an SVG image for the box. Unfortunately, the plugin used file_get_contents with no verification that the file being supplied was an SVG file, so any user with access to the Elementor page builder, such as contributors, could read arbitrary files on the WordPress installation.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 06:37
Type | Values Removed | Values Added |
---|---|---|
References | () https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2523506%40the-plus-addons-for-elementor-page-builder&new=2523506%40the-plus-addons-for-elementor-page-builder&sfp_email=&sfph_mail= - Third Party Advisory | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/aa698e7e-b1c7-4ead-aa2e-7fbfc9dfac80 - Third Party Advisory |
07 Nov 2023, 03:40
Type | Values Removed | Values Added |
---|---|---|
CWE |
Information
Published : 2023-03-07 15:15
Updated : 2024-11-21 06:37
NVD link : CVE-2021-4332
Mitre link : CVE-2021-4332
CVE.ORG link : CVE-2021-4332
JSON object : View
Products Affected
posimyth
- the_plus_addons_for_elementor
CWE
No CWE.