Elementor Addon Elements <= 1.12.12 - Directory Traversal to Local File Inclusion
Summary
| CVE | CVE-2024-1358 |
|---|---|
| State | PUBLISHED |
| Assigner | Wordfence |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2024-03-13 16:15:19 UTC |
| Updated | 2026-04-08 17:18:19 UTC |
| Description | The Elementor Addon Elements plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 1.12.12 via the render function. This makes it possible for authenticated attackers, with contributor access or higher, to include the contents of arbitrary PHP files on the server, which may expose sensitive information. |
Risk And Classification
Primary CVSS: v3.1 6.5 MEDIUM from [email protected]
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Problem Types: CWE-22 | CWE-22 CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
| Version | Source | Type | Score | Severity | Vector |
|---|---|---|---|---|---|
| 3.1 | [email protected] | Primary | 6.5 | MEDIUM | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
| 3.1 | [email protected] | Secondary | 8.8 | HIGH | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
| 3.1 | CNA | DECLARED | 8.8 | HIGH | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
CVSS v3.1 Breakdown
Attack Vector
NetworkAttack Complexity
LowPrivileges Required
LowUser Interaction
NoneScope
UnchangedConfidentiality
HighIntegrity
NoneAvailability
NoneCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Webtechstreet | Elementor Addon Elements | All | All | All | All |
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|---|---|---|---|
| CNA | Wpvibes | Addon Elements For Elementor Formerly Elementor Addon Elements | affected 1.12.12 semver | Not specified |
| ADP | Wpvibes | Anywhere Elementor | affected 1.12.12 semver | Not specified |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| www.wordfence.com/threat-intel/vulnerabilities/id/20cd3fff-0488-4bc2-961b-24279... | af854a3a-2127-422b-91ae-364da2661108 | www.wordfence.com | Third Party Advisory |
| plugins.trac.wordpress.org/changeset/3037925/addon-elements-for-elementor-page-builder/t... | af854a3a-2127-422b-91ae-364da2661108 | plugins.trac.wordpress.org | Patch |
| plugins.trac.wordpress.org/browser/addon-elements-for-elementor-page-builder/tags/1.12.1... | af854a3a-2127-422b-91ae-364da2661108 | plugins.trac.wordpress.org | Product |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
Vendor Comments And Credit
Discovery Credit
CNA: wesley (en)
Additional Advisory Data
| Source | Time | Event |
|---|---|---|
| CNA | 2024-02-21T00:00:00.000Z | Disclosed |
There are currently no legacy QID mappings associated with this CVE.