CVE Radar Logo
CVERadar
CVE Radar Logo
CVERadar

CVE-2024-5348

Medium Severity
SVRS
30/100

CVSSv3
NA/10

EPSS
0.00823/1

CVE-2024-5348 is a Local File Inclusion (LFI) vulnerability in the Elements For Elementor WordPress plugin. This vulnerability, affecting versions up to 2.1, allows authenticated attackers with Contributor-level access or higher to include and execute arbitrary files on the server. Attackers can exploit this by manipulating attributes like 'beforeafter_layout', 'eventsgrid_layout', and others within various widgets to include malicious files.

The vulnerability poses a significant risk as it can lead to the execution of arbitrary PHP code, enabling attackers to bypass access controls, steal sensitive data, or achieve remote code execution if they can upload and include "safe" file types. While the CVSS score is 0, the SOCRadar Vulnerability Risk Score (SVRS) is 30, highlighting a moderate level of risk based on real-world exploitability, although not critical, should still be addressed. This makes CVE-2024-5348 a serious concern for websites using the vulnerable plugin and requires immediate patching to prevent potential compromise. This vulnerability could also be used to escalate privileges within the WordPress environment.

In The Wild
2024-06-01

2024-06-03
Eye Icon
SOCRadar
AI Insight

Description:

CVE-2024-5348 is a Local File Inclusion (LFI) vulnerability in the Elements For Elementor plugin for WordPress. It allows authenticated attackers with Contributor-level access or higher to include and execute arbitrary files on the server, potentially leading to sensitive data exposure, access control bypass, or code execution.

Key Insights:

  • High Severity: The CVSS score of 8.8 indicates a high severity vulnerability, requiring immediate attention.
  • SVRS of 30: The SOCRadar Vulnerability Risk Score (SVRS) of 30 suggests a moderate risk, highlighting the need for proactive monitoring and mitigation.
  • Authenticated Attackers: The vulnerability can be exploited by authenticated attackers with Contributor-level access or higher, making it accessible to a wide range of potential attackers.

Mitigation Strategies:

  • Update Plugin: Update the Elements For Elementor plugin to version 2.2 or later to address the vulnerability.
  • Restrict Access: Limit access to the plugin's vulnerable attributes to only authorized users with a higher level of privilege.
  • Monitor Logs: Monitor server logs for any suspicious activity or attempts to exploit the vulnerability.
  • Implement Web Application Firewall (WAF): Configure a WAF to block malicious requests that attempt to exploit the LFI vulnerability.

Additional Information:

  • Threat Actors/APT Groups: No specific threat actors or APT groups have been identified as actively exploiting this vulnerability.
  • Exploit Status: Active exploits have not been published.
  • CISA Warnings: The Cybersecurity and Infrastructure Security Agency (CISA) has not issued a warning for this vulnerability.
  • In the Wild: The vulnerability is not known to be actively exploited in the wild.

If users have additional queries regarding this incident, they can use the 'Ask to Analyst' feature, contact SOCRadar directly, or open a support ticket for more information if necessary.

Indicators of Compromise

No IOCs found for this CVE

Exploits

No exploits found for this CVE

Enhance Your CVE Management with SOCRadar Vulnerability Intelligence
Get comprehensive CVE details, real-time notifications, and proactive threat management all in one platform.
CVE Details
Access comprehensive CVE information instantly
Real-time Tracking
Subscribe to CVEs and get instant updates
Exploit Analysis
Monitor related APT groups and threats
IOC Tracking
Analyze and track CVE-related IOCs

News

CVE-2024-5348 | Elements for Elementor Plugin up to 2.1 on WordPress Widget Attribute file inclusion
vuldb.com2024-06-01
CVE-2024-5348 | Elements for Elementor Plugin up to 2.1 on WordPress Widget Attribute file inclusion | A vulnerability classified as problematic was found in Elements for Elementor Plugin up to 2.1 on WordPress. Affected by this vulnerability is an unknown functionality of the component Widget Attribute Handler. The manipulation leads to file inclusion. This vulnerability is known as CVE-2024-5348. The attack needs
cve-2024-5348
domains
urls
cves

Social Media

CVE-2024-5348 (CVSS:8.8, HIGH) is Received. The Elements For Elementor plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and includi..https://t.co/HoQjp1Dy1N #cybersecurityawareness #cybersecurity #CVE #infosec #hacker #nvd #mitre
0
0
0
CVE-2024-5348 The Elements For Elementor plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 2.1 via the 'beforeafter_layout' attribute o… https://t.co/P7zYkmNhLe
0
0
0
[CVE-2024-5348: Score 8.8/HIGH] The Elements For Elementor plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 2.1 via the 'beforeafter_layout' attribute of the beforeafter widget, the ... https://t.co/eUKab2Mgp9
0
0
0

Affected Software

No affected software found for this CVE

References

ReferenceLink
[email protected]https://plugins.trac.wordpress.org/browser/nd-elements/trunk/widgets/beforeafter/index.php#L121
[email protected]https://plugins.trac.wordpress.org/browser/nd-elements/trunk/widgets/eventsgrid/index.php#L113
[email protected]https://plugins.trac.wordpress.org/browser/nd-elements/trunk/widgets/list/index.php#L401
[email protected]https://plugins.trac.wordpress.org/browser/nd-elements/trunk/widgets/marquee/index.php#L200
[email protected]https://plugins.trac.wordpress.org/browser/nd-elements/trunk/widgets/postgrid/index.php#L186
[email protected]https://plugins.trac.wordpress.org/changeset/3094318/
[email protected]https://www.wordfence.com/threat-intel/vulnerabilities/id/e55b86e2-b42e-483d-93cd-2f09af64dbc7?source=cve

CWE Details

No CWE details found for this CVE

CVE Radar

Real-time CVE Intelligence & Vulnerability Management Platform

CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.

Get Free Vulnerability Intelligence AccessAccess real-time CVE monitoring, exploit analysis, and threat intelligence