CVE-2024-4404
ElementsKit PRO <= 3.6.1 - Authenticated (Contributor+) Server-Side Request Forgery
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
The ElementsKit PRO plugin for WordPress is vulnerable to Server-Side Request Forgery in versions up to, and including, 3.6.2 via the 'render_raw' function. This can allow authenticated attackers, with contributor-level permissions and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.
El complemento ElementsKit PRO para WordPress es vulnerable a Server-Side Request Forgery en versiones hasta la 3.6.2 incluida a través de la función 'render_raw'. Esto puede permitir a atacantes autenticados, con permisos de nivel de colaborador y superiores, realizar solicitudes web a ubicaciones arbitrarias que se originen en la aplicación web y puede usarse para consultar y modificar información de servicios internos.
CVSS Scores
SSVC
- Decision:Track
Timeline
- 2024-05-01 CVE Reserved
- 2024-06-13 CVE Published
- 2024-06-14 EPSS Updated
- 2024-08-01 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-918: Server-Side Request Forgery (SSRF)
CAPEC
References (2)
URL | Tag | Source |
---|---|---|
https://wpmet.com/plugin/elementskit/roadmaps | ||
https://www.wordfence.com/threat-intel/vulnerabilities/id/6417269d-3d49-4f33-b92a-5aacb052bab0?source=cve |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Wpmet Search vendor "Wpmet" | ElementsKit Pro Search vendor "Wpmet" for product "ElementsKit Pro" | <= 3.6.2 Search vendor "Wpmet" for product "ElementsKit Pro" and version " <= 3.6.2" | en |
Affected
|