The Elementor Website Builder plugin for WordPress is vulnerable to unauthorized execution of several AJAX actions due to a missing capability check in the ~/core/app/modules/onboarding/module.php file that make it possible for attackers to modify site data in addition to uploading malicious files that can be used to obtain remote code execution, in versions 3.6.0 to 3.6.2.
Solution:
The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.
The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Link | Tags |
---|---|
https://www.wordfence.com/blog/2022/04/elementor-critical-remote-code-execution-vulnerability/ | third party advisory exploit |
https://plugins.trac.wordpress.org/changeset/2708766/elementor/trunk/core/app/modules/onboarding/module.php | release notes patch vendor advisory |
https://www.pluginvulnerabilities.com/2022/04/12/5-million-install-wordpress-plugin-elementor-contains-authenticated-remote-code-execution-rce-vulnerability/ | third party advisory exploit |
http://packetstormsecurity.com/files/168615/WordPress-Elementor-3.6.2-Shell-Upload.html | exploit vdb entry third party advisory |