The WPZOOM Addons for Elementor (Templates, Widgets) plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 1.1.37 via the 'grid_style' parameter. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included.
History

Wed, 05 Feb 2025 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Wpzoom
Wpzoom wpzoom Elementor Addons
Weaknesses NVD-CWE-Other
CPEs cpe:2.3:a:wpzoom:wpzoom_elementor_addons:*:*:*:*:*:wordpress:*:*
Vendors & Products Wpzoom
Wpzoom wpzoom Elementor Addons

cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2024-08-01T21:03:10.671Z

Reserved: 2024-05-20T17:09:00.794Z

Link: CVE-2024-5147

cve-icon Vulnrichment

Updated: 2024-08-01T21:03:10.671Z

cve-icon NVD

Status : Analyzed

Published: 2024-05-22T08:15:10.743

Modified: 2025-02-05T14:52:39.890

Link: CVE-2024-5147

cve-icon Redhat

No data.