cve/2024/CVE-2024-1358.md

19 lines
1016 B
Markdown
Raw Permalink Normal View History

2025-09-29 21:09:30 +02:00
### [CVE-2024-1358](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1358)
![](https://img.shields.io/static/v1?label=Product&message=Elementor%20Addon%20Elements&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=*%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20('Path%20Traversal')&color=brightgreen)
### Description
The Elementor Addon Elements plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 1.12.12 via the render function. This makes it possible for authenticated attackers, with contributor access or higher, to include the contents of arbitrary PHP files on the server, which may expose sensitive information.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/20142995/nuclei-templates