CVE-2024-32718
WordPress The Pack Elementor addons plugin <= 2.0.8.2 - Server Side Request Forgery (SSRF) vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Server-Side Request Forgery (SSRF) vulnerability in Webangon The Pack Elementor.This issue affects The Pack Elementor addons: from n/a through 2.0.8.2.
Vulnerabilidad de Server-Side Request Forgery (SSRF) en Webangon The Pack Elementor. Este problema afecta a los complementos de The Pack Elementor: desde n/a hasta 2.0.8.2.
The The Pack Elementor addons (Header Footer & WooCommerce Builder, Template Library) plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 2.0.8.2. This makes it possible for authenticated attackers, with subscriber-level access and above, to make web requests to arbitrary locations originating from the web application which can be used to query and modify information from internal services.
CVSS Scores
SSVC
- Decision:Track
Timeline
- 2024-04-17 CVE Reserved
- 2024-04-22 CVE Published
- 2024-08-02 CVE Updated
- 2025-01-22 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-918: Server-Side Request Forgery (SSRF)
CAPEC
References (1)
URL | Tag | Source |
---|---|---|
https://patchstack.com/database/vulnerability/the-pack-addon/wordpress-the-pack-elementor-addons-plugin-2-0-8-2-server-side-request-forgery-ssrf-vulnerability?_s_id=cve | Vdb Entry |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
The Pack Addon Search vendor "The Pack Addon" | The Pack Addon Search vendor "The Pack Addon" for product "The Pack Addon" | >= 0.0.0.0 <= 2.0.8.2 Search vendor "The Pack Addon" for product "The Pack Addon" and version " >= 0.0.0.0 <= 2.0.8.2" | en |
Affected
|