Products
ElementsKit PRO plugin for WordPress
- up to 3.6.2
Source
security@wordfence.com
Tags
CVE-2024-4404 details
Published : June 14, 2024, 6:15 a.m.
Last Modified : June 14, 2024, 6:15 a.m.
Last Modified : June 14, 2024, 6:15 a.m.
Description
The ElementsKit PRO plugin for WordPress is vulnerable to Server-Side Request Forgery in versions up to, and including, 3.6.2 via the 'render_raw' function. This can allow authenticated attackers, with contributor-level permissions and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.
CVSS Score
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8.5 | 9 | 10 |
---|
Weakness
Weakness | Name | Description |
---|
CVSS Data
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
LOW
Availability Impact
NONE
Base Score
8.5
Exploitability Score
Impact Score
Base Severity
HIGH
Vector String : CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N
References
URL | Source |
---|---|
https://wpmet.com/plugin/elementskit/roadmaps/ | security@wordfence.com |
https://www.wordfence.com/threat-intel/vulnerabilities/id/6417269d-3d49-4f33-b92a-5aacb052bab0?source=cve | security@wordfence.com |
This website uses the NVD API, but is not approved or certified by it.