Unlimited Elements for Elementor <= 1.5.89 - Authenticated(Contributor+) Remote Code Execution via template import
Summary
| CVE | CVE-2023-6743 |
|---|---|
| State | PUBLISHED |
| Assigner | Wordfence |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2024-05-29 05:16:08 UTC |
| Updated | 2026-04-08 17:17:15 UTC |
| Description | The Unlimited Elements For Elementor (Free Widgets, Addons, Templates) plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 1.5.89 via the template import functionality. This makes it possible for authenticated attackers, with contributor access and above, to execute code on the server. |
Risk And Classification
Primary CVSS: v3.1 8.8 HIGH from [email protected]
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Problem Types: CWE-1336 | CWE-94 | CWE-1336 CWE-1336 Improper Neutralization of Special Elements Used in a Template Engine
| Version | Source | Type | Score | Severity | Vector |
|---|---|---|---|---|---|
| 3.1 | [email protected] | Secondary | 8.8 | HIGH | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
| 3.1 | CNA | DECLARED | 8.8 | HIGH | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
CVSS v3.1 Breakdown
Attack Vector
NetworkAttack Complexity
LowPrivileges Required
LowUser Interaction
NoneScope
UnchangedConfidentiality
HighIntegrity
HighAvailability
HighCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Unlimited-elements | Unlimited Elements For Elementor | All | All | All | All |
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|---|---|---|---|
| CNA | Unitecms | Unlimited Elements For Elementor | affected 1.5.89 semver | Not specified |
| ADP | Unitecms | Unlimited Elements For Elementor | affected 1.5.89 semver | Not specified |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| plugins.trac.wordpress.org/browser/unlimited-elements-for-elementor/trunk/provider/core/... | af854a3a-2127-422b-91ae-364da2661108 | plugins.trac.wordpress.org | Product |
| plugins.trac.wordpress.org/changeset/3015166/unlimited-elements-for-elementor | af854a3a-2127-422b-91ae-364da2661108 | plugins.trac.wordpress.org | Patch |
| www.wordfence.com/threat-intel/vulnerabilities/id/25f71a19-85b1-4bc9-b193-d9de2... | af854a3a-2127-422b-91ae-364da2661108 | www.wordfence.com | Third Party Advisory |
| plugins.trac.wordpress.org/browser/unlimited-elements-for-elementor/trunk/inc_php/unitec... | af854a3a-2127-422b-91ae-364da2661108 | plugins.trac.wordpress.org | Product |
| plugins.trac.wordpress.org/changeset/3010986/unlimited-elements-for-elementor | af854a3a-2127-422b-91ae-364da2661108 | plugins.trac.wordpress.org | Patch |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
Vendor Comments And Credit
Discovery Credit
CNA: Nex Team (en)
Additional Advisory Data
| Source | Time | Event |
|---|---|---|
| CNA | 2024-05-28T00:00:00.000Z | Disclosed |
There are currently no legacy QID mappings associated with this CVE.