The ElementInvader Addons for Elementor plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.3.1 via the eli_option_value shortcode. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract arbitrary options from the wp_options table.
References
Configurations
Configuration 1 (hide)
|
History
06 Mar 2025, 19:54
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:elementinvader:elementinvader_addons_for_elementor:*:*:*:*:*:wordpress:*:* | |
First Time |
Elementinvader
Elementinvader elementinvader Addons For Elementor |
|
Summary |
|
|
References | () https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3203139%40elementinvader-addons-for-elementor&new=3203139%40elementinvader-addons-for-elementor&sfp_email=&sfph_mail= - Patch | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/cf7ec469-70b7-4ec2-83df-c788c76730b4?source=cve - Third Party Advisory |
12 Dec 2024, 06:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-12-12 06:15
Updated : 2025-03-06 19:54
NVD link : CVE-2024-12059
Mitre link : CVE-2024-12059
CVE.ORG link : CVE-2024-12059
JSON object : View
Products Affected
elementinvader
- elementinvader_addons_for_elementor
CWE
CWE-639
Authorization Bypass Through User-Controlled Key