The Elementor Addon Elements plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 1.12.12 via the render function. This makes it possible for authenticated attackers, with contributor access or higher, to include the contents of arbitrary PHP files on the server, which may expose sensitive information.
Metrics
Affected Vendors & Products
References
History
Fri, 17 Jan 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Webtechstreet
Webtechstreet elementor Addon Elements |
|
Weaknesses | CWE-22 | |
CPEs | cpe:2.3:a:webtechstreet:elementor_addon_elements:*:*:*:*:*:wordpress:*:* | |
Vendors & Products |
Webtechstreet
Webtechstreet elementor Addon Elements |

Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2024-08-08T20:19:03.701Z
Reserved: 2024-02-08T18:18:46.714Z
Link: CVE-2024-1358

Updated: 2024-08-01T18:33:25.444Z

Status : Analyzed
Published: 2024-03-13T16:15:19.870
Modified: 2025-01-17T19:52:41.687
Link: CVE-2024-1358

No data.