The Element Pack Elementor Addons (Header Footer, Template Library, Dynamic Grid & Carousel, Remote Arrows) plugin for WordPress is vulnerable to arbitrary file reads in all versions up to, and including, 5.7.2 via the SVG widget and a lack of sufficient file validation in the render_svg function. This makes it possible for authenticated attackers, with contributor-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information.
Metrics
Affected Vendors & Products
References
History
Wed, 29 Jan 2025 16:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Bdthemes
Bdthemes element Pack |
|
Weaknesses | CWE-829 | |
CPEs | cpe:2.3:a:bdthemes:element_pack:*:*:*:*:lite:wordpress:*:* | |
Vendors & Products |
Bdthemes
Bdthemes element Pack |
Fri, 09 Aug 2024 15:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 09 Aug 2024 04:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The Element Pack Elementor Addons (Header Footer, Template Library, Dynamic Grid & Carousel, Remote Arrows) plugin for WordPress is vulnerable to arbitrary file reads in all versions up to, and including, 5.7.2 via the SVG widget and a lack of sufficient file validation in the render_svg function. This makes it possible for authenticated attackers, with contributor-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information. | |
Title | Element Pack Elementor Addons (Header Footer, Template Library, Dynamic Grid & Carousel, Remote Arrows) <= 5.7.2 - Authenticated (Contributor+) Arbitrary File Read | |
Weaknesses | CWE-98 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2024-08-09T14:47:46.968Z
Reserved: 2024-04-30T18:10:27.847Z
Link: CVE-2024-4359

Updated: 2024-08-09T14:47:43.239Z

Status : Analyzed
Published: 2024-08-12T13:38:36.593
Modified: 2025-01-29T15:44:39.083
Link: CVE-2024-4359

No data.