WPZOOM Addons for Elementor (Templates, Widgets) <= 1.1.37 - Unauthenticated Local File Inclusion
Summary
| CVE | CVE-2024-5147 |
|---|---|
| State | PUBLISHED |
| Assigner | Wordfence |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2024-05-22 08:15:10 UTC |
| Updated | 2026-04-08 19:21:51 UTC |
| Description | The WPZOOM Addons for Elementor (Templates, Widgets) plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 1.1.37 via the 'grid_style' parameter. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included. |
Risk And Classification
Primary CVSS: v3.1 9.8 CRITICAL from [email protected]
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS: 0.007640000 probability, percentile 0.734320000 (date 2026-04-09)
Problem Types: CWE-22 | NVD-CWE-Other | CWE-22 CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
| Version | Source | Type | Score | Severity | Vector |
|---|---|---|---|---|---|
| 3.1 | [email protected] | Secondary | 9.8 | CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
| 3.1 | CNA | DECLARED | 9.8 | CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
CVSS v3.1 Breakdown
Attack Vector
NetworkAttack Complexity
LowPrivileges Required
NoneUser Interaction
NoneScope
UnchangedConfidentiality
HighIntegrity
HighAvailability
HighCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Wpzoom | Wpzoom Elementor Addons | All | All | All | All |
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|---|---|---|---|
| CNA | Wpzoom | WPZOOM Addons For Elementor Starter Templates Widgets | affected 1.1.37 semver | Not specified |
| ADP | Wpzoom | Wpzoom Addons For Elementor | affected 1.1.37 custom | Not specified |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| plugins.trac.wordpress.org/browser/wpzoom-elementor-addons/trunk/includes/wpzoom-element... | af854a3a-2127-422b-91ae-364da2661108 | plugins.trac.wordpress.org | Product |
| plugins.trac.wordpress.org/changeset/3090236 | af854a3a-2127-422b-91ae-364da2661108 | plugins.trac.wordpress.org | Patch |
| plugins.trac.wordpress.org/browser/wpzoom-elementor-addons/trunk/includes/wpzoom-element... | af854a3a-2127-422b-91ae-364da2661108 | plugins.trac.wordpress.org | Product |
| www.wordfence.com/threat-intel/vulnerabilities/id/f006bb33-d017-445b-9c02-bd848... | af854a3a-2127-422b-91ae-364da2661108 | www.wordfence.com | Third Party Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
Vendor Comments And Credit
Discovery Credit
CNA: Craig Smith (en)
Additional Advisory Data
| Source | Time | Event |
|---|---|---|
| CNA | 2024-05-21T00:00:00.000Z | Disclosed |
There are currently no legacy QID mappings associated with this CVE.