Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

Critical Flaw Impacts WordPress Plugin With 1 Million Installations

Over one million WordPress websites might have been impacted by a critical vulnerability in the Essential Addons for Elementor plugin.

Essential Addons for Elementor provides WordPress site admins with more than 80 elements and extensions to help them easily design WordPress pages and posts.

Over one million WordPress websites might have been impacted by a critical vulnerability in the Essential Addons for Elementor plugin.

Essential Addons for Elementor provides WordPress site admins with more than 80 elements and extensions to help them easily design WordPress pages and posts.

Affecting version 5.0.4 and earlier of the plugin, the security flaw allows any user to perform a local file inclusion attack, regardless of their authentication or authorization level. The attack then could lead to remote code execution, if the included file contains malicious PHP code.

The issue was initially discovered by Wai Yan Myo Thet and the plugin’s developers attempted to resolve it in version 5.0.3, and then again in version 5.0.4, but failed. A complete patch was released last week, when Essential Addons for Elementor version 5.0.5 was rolled out.

The security error exists because of the manner in which “user input data is used inside of PHP’s include function that are part of the ajax_load_more and ajax_eael_product_gallery functions,” WordPress security firm Patchstack explains.

[READ: WordPress 5.8.3 Patches Several Injection Vulnerabilities]

The security firm also notes that the vulnerability only exists if widgets such as dynamic gallery or product gallery are in use, as they are those that employ the vulnerable functions and because a nonce token check is visible only when these widgets are enabled.

More than one million WordPress sites use Essential Addons for Elementor, but it’s unclear how many of them have the widgets enabled. More than 400,000 websites have already updated their installations to the patched version of the plugin, but over 600,000 of them remain potentially vulnerable.

Related: GoDaddy Breach Exposes 1.2 Million Managed WordPress Customer Accounts

Related: Critical Flaw in WordPress Plugin Leads to Database Wipe

Related: Remote Code Execution Flaws Patched in WordPress Download Manager Plugin

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this webinar to learn best practices that organizations can use to improve both their resilience to new threats and their response times to incidents.

Register

Join this live webinar as we explore the potential security threats that can arise when third parties are granted access to a sensitive data or systems.

Register

Expert Insights

Related Content

Vulnerabilities

Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Application Security

Drupal released updates that resolve four vulnerabilities in Drupal core and three plugins.

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Vulnerabilities

Apple has released updates for macOS, iOS and Safari and they all include a WebKit patch for a zero-day vulnerability tracked as CVE-2023-23529.

Cloud Security

VMware vRealize Log Insight vulnerability allows an unauthenticated attacker to take full control of a target system.

Application Security

A CSRF vulnerability in the source control management (SCM) service Kudu could be exploited to achieve remote code execution in multiple Azure services.

IoT Security

Lexmark warns of a remote code execution (RCE) vulnerability impacting over 120 printer models, for which PoC code has been published.

Vulnerabilities

GoAnywhere MFT users warned about a zero-day remote code injection exploit that can be targeted directly from the internet