CVE-2024-10670
Primary Addon for Elementor <= 1.6.2 - Authenticated (Contributor+) Post Disclosure
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
The Primary Addon for Elementor plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 1.6.2 via the [prim_elementor_template] shortcode due to insufficient restrictions on which posts can be included. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract data from private or draft posts created with Elementor that they should not have access to.
El complemento Primary Addon for Elementor para WordPress es vulnerable a la exposición de información en todas las versiones hasta la 1.6.2 incluida a través del código abreviado [prim_elementor_template] debido a restricciones insuficientes sobre qué publicaciones se pueden incluir. Esto permite que atacantes autenticados, con acceso de nivel de colaborador y superior, extraigan datos de publicaciones privadas o borradores creadas con Elementor a las que no deberían tener acceso.
CVSS Scores
SSVC
- Decision:Track
Timeline
- 2024-11-01 CVE Reserved
- 2024-11-27 CVE Published
- 2024-11-29 CVE Updated
- 2024-12-17 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-639: Authorization Bypass Through User-Controlled Key
CAPEC
References (2)
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Nicheaddons Search vendor "Nicheaddons" | Primary Addon For Elementor Search vendor "Nicheaddons" for product "Primary Addon For Elementor" | <= 1.6.2 Search vendor "Nicheaddons" for product "Primary Addon For Elementor" and version " <= 1.6.2" | en |
Affected
|