CVE Radar Logo
CVERadar
CVE Radar Logo
CVERadar

CVE-2024-10357

Medium Severity
SVRS
30/100

CVSSv3
NA/10

EPSS
0.0006/1

CVE-2024-10357 is a Sensitive Information Exposure vulnerability in the Clever Addons for Elementor WordPress plugin. This flaw allows authenticated attackers with contributor-level access or higher to access sensitive template data.

CVE-2024-10357 exposes private, pending, and draft template data within the Clever Addons for Elementor plugin, potentially revealing confidential information. Present in versions up to 2.2.1, the vulnerability stems from the getTemplateContent function. While the SVRS score is 30, indicating a lower risk compared to critical vulnerabilities, the unauthorized access to sensitive data can still lead to data breaches and compromise the confidentiality of website content. This vulnerability could allow attackers to view unpublished content, intellectual property, or other sensitive information intended to be kept private. Although the CVSS score is 0, organizations should assess the risk based on their specific circumstances and the sensitivity of the data managed by the affected plugin. Immediate patching is advisable.

In The Wild
2024-10-26

2024-10-28
Eye Icon
SOCRadar
AI Insight

Description

CVE-2024-10357 is a vulnerability in the Clever Addons for Elementor plugin for WordPress that allows authenticated attackers with Contributor-level access and above to extract sensitive private, pending, and draft template data. This vulnerability is rated as 4.3 on the CVSS scale and has a SOCRadar Vulnerability Risk Score (SVRS) of 42, indicating a moderate level of risk.

Key Insights

  • Sensitive Data Exposure: This vulnerability allows attackers to access sensitive template data, including private, pending, and draft content. This data could be used to compromise the website or steal sensitive information.
  • Authenticated Attackers: The vulnerability requires attackers to have Contributor-level access to the website. This means that attackers could potentially gain access to the website through other vulnerabilities or by compromising user credentials.
  • Exploit Status: There are no known active exploits for this vulnerability at this time. However, it is important to note that vulnerabilities can be exploited quickly after they are discovered.

Mitigation Strategies

  • Update the Plugin: The vendor has released a patch for this vulnerability. It is important to update the plugin to the latest version as soon as possible.
  • Restrict Access: Limit access to the website to only those users who need it. This will help to reduce the risk of attackers gaining access to the website and exploiting the vulnerability.
  • Monitor for Suspicious Activity: Monitor the website for any suspicious activity, such as unauthorized access attempts or changes to sensitive data.
  • Use a Web Application Firewall (WAF): A WAF can help to block malicious traffic and protect the website from attacks.

Additional Information

  • Threat Actors/APT Groups: There are no known threat actors or APT groups that are actively exploiting this vulnerability at this time.
  • CISA Warnings: The Cybersecurity and Infrastructure Security Agency (CISA) has not issued a warning for this vulnerability.
  • In the Wild: This vulnerability is not currently being exploited in the wild.

If users have additional queries regarding this incident, they can use the 'Ask to Analyst' feature, contact SOCRadar directly, or open a support ticket for more information if necessary.

Indicators of Compromise

No IOCs found for this CVE

Exploits

No exploits found for this CVE

Enhance Your CVE Management with SOCRadar Vulnerability Intelligence
Get comprehensive CVE details, real-time notifications, and proactive threat management all in one platform.
CVE Details
Access comprehensive CVE information instantly
Real-time Tracking
Subscribe to CVEs and get instant updates
Exploit Analysis
Monitor related APT groups and threats
IOC Tracking
Analyze and track CVE-related IOCs

News

CVE-2024-10357 | Clever Addons for Elementor Plugin up to 2.2.1 on WordPress Elementor Template information disclosure
vuldb.com2024-10-26
CVE-2024-10357 | Clever Addons for Elementor Plugin up to 2.2.1 on WordPress Elementor Template information disclosure | A vulnerability, which was classified as problematic, was found in Clever Addons for Elementor Plugin up to 2.2.1 on WordPress. Affected is an unknown function of the component Elementor Template Handler. The manipulation leads to information disclosure. This vulnerability is traded as CVE-2024-10357. It is
cve-2024-10357
domains
urls
cves

Social Media

CVE-2024-10357 The Clever Addons for Elementor plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.2.1 via the getTemplateContent function in src/widgets/cl... https://t.co/97WVT4q5dN
0
0
0
CVE-2024-10357 The Clever Addons for Elementor plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.2.1 via the getTemplateCo… https://t.co/gaCrRW5oJK
0
0
0

Affected Software

No affected software found for this CVE

References

ReferenceLink
[email protected]https://plugins.trac.wordpress.org/browser/cafe-lite/trunk/src/widgets/class-clever-widget-base.php#L411
[email protected]https://www.wordfence.com/threat-intel/vulnerabilities/id/e1fa3569-9a9a-4aa6-9057-c87601fadb9f?source=cve

CWE Details

CWE IDCWE NameDescription
CWE-200Exposure of Sensitive Information to an Unauthorized ActorThe product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.

CVE Radar

Real-time CVE Intelligence & Vulnerability Management Platform

CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.

Get Free Vulnerability Intelligence AccessAccess real-time CVE monitoring, exploit analysis, and threat intelligence