Unauthorized Data Modification in Elementor Pro Plugin for WordPress
CVE-2023-3124

8.8HIGH

Key Information:

Vendor
Wordpress
Vendor
CVE Published:
7 June 2023

Badges

πŸ‘Ύ Exploit Exists🟑 Public PoC

Summary

The Elementor Pro plugin for WordPress is susceptible to unauthorized data manipulation due to a lack of capability verification in the update_page_option function. This vulnerability affects versions up to and including 3.11.6, allowing authenticated attackers with subscriber-level access to modify arbitrary site options, potentially leading to privilege escalation and compromised site integrity.

Affected Version(s)

Elementor Website Builder Pro * <= 3.11.6

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • 🟑

    Public PoC available

  • πŸ‘Ύ

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

Jerome Bruandet
.