The Primary Addon for Elementor plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 1.6.2 via the [prim_elementor_template] shortcode due to insufficient restrictions on which posts can be included. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract data from private or draft posts created with Elementor that they should not have access to.
Metrics
Affected Vendors & Products
References
History
Fri, 29 Nov 2024 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 28 Nov 2024 10:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The Primary Addon for Elementor plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 1.6.2 via the [prim_elementor_template] shortcode due to insufficient restrictions on which posts can be included. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract data from private or draft posts created with Elementor that they should not have access to. | |
Title | Primary Addon for Elementor <= 1.6.2 - Authenticated (Contributor+) Post Disclosure | |
Weaknesses | CWE-639 | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: Wordfence
Published: 2024-11-28T09:47:11.212Z
Updated: 2024-11-29T17:19:51.340Z
Reserved: 2024-11-01T10:13:51.325Z
Link: CVE-2024-10670
Vulnrichment
Updated: 2024-11-29T17:18:50.455Z
NVD
Status : Received
Published: 2024-11-28T10:15:04.987
Modified: 2024-11-28T10:15:04.987
Link: CVE-2024-10670
Redhat
No data.