CVE-2024-5153
CVE-2024-5153 is a critical directory traversal vulnerability affecting the Startklar Elementor Addons plugin for WordPress. This flaw allows unauthenticated attackers to read sensitive files and delete arbitrary directories on the server. While its CVSS score is a high 9.8, the SOCRadar Vulnerability Risk Score (SVRS) is 30, suggesting a lower immediate real-world threat level despite its inherent severity. The 'dropzone_hash' parameter is the key to exploiting this vulnerability. Successful exploitation can lead to information disclosure and complete site compromise, potentially exposing sensitive data and allowing attackers to take full control of the affected WordPress installation. This highlights the risk of using vulnerable WordPress plugins. Organizations using the Startklar Elementor Addons plugin should immediately update to a patched version or remove the plugin to mitigate the risk.
Indicators of Compromise
Exploits
News
Social Media
Affected Software
References
CWE Details
CVE Radar
Real-time CVE Intelligence & Vulnerability Management Platform
CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.