The Magical Addons For Elementor plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.2.4 via the get_content_type function in includes/widgets/content-reveal.php. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract sensitive private, pending, and draft template data.
References
Configurations
History
29 Jan 2025, 19:10
Type | Values Removed | Values Added |
---|---|---|
CWE | NVD-CWE-noinfo | |
First Time |
Wpthemespace
Wpthemespace magical Addons For Elementor |
|
CPE | cpe:2.3:a:wpthemespace:magical_addons_for_elementor:*:*:*:*:*:wordpress:*:* | |
References | () https://plugins.trac.wordpress.org/changeset/3182827/magical-addons-for-elementor - Patch | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/8aa2ba7f-c33d-4e80-b1cf-2d7b2a497f04?source=cve - Third Party Advisory |
Information
Published : 2024-11-09 12:15
Updated : 2025-01-29 19:10
NVD link : CVE-2024-10352
Mitre link : CVE-2024-10352
CVE.ORG link : CVE-2024-10352
JSON object : View
Products Affected
wpthemespace
- magical_addons_for_elementor
CWE