CVE-2024-12059: CWE-639 Authorization Bypass Through User-Controlled Key in elementinvader ElementInvader Addons for Elementor
CVE-2024-12059 is a medium severity vulnerability in the ElementInvader Addons for Elementor WordPress plugin, affecting all versions up to 1. 3. 1. It allows authenticated users with Contributor-level access or higher to exploit the eli_option_value shortcode to extract arbitrary data from the wp_options database table. This vulnerability is classified as an authorization bypass via a user-controlled key, leading to sensitive information exposure without requiring user interaction. Although it does not impact integrity or availability, the exposure of sensitive configuration data can aid attackers in further attacks. No known exploits are currently reported in the wild. Organizations using this plugin should prioritize updating or applying mitigations to prevent unauthorized data disclosure. The threat primarily affects WordPress sites globally, especially those with Contributor-level user roles enabled. Given the plugin's usage patterns, countries with high WordPress adoption and active web development communities are at greater risk.
AI Analysis
Technical Summary
CVE-2024-12059 is a vulnerability identified in the ElementInvader Addons for Elementor plugin for WordPress, affecting all versions up to and including 1.3.1. The flaw arises from improper authorization checks in the eli_option_value shortcode, which allows authenticated users with Contributor-level privileges or higher to retrieve arbitrary option values from the wp_options table. This table typically stores critical site configuration and plugin settings, which can include sensitive information such as API keys, tokens, or other secrets. The vulnerability is categorized under CWE-639 (Authorization Bypass Through User-Controlled Key), indicating that the plugin fails to properly restrict access to sensitive data based on user permissions. Exploitation requires no user interaction beyond authentication at the Contributor level, making it relatively easy for insiders or compromised accounts with limited privileges to escalate their information access. The CVSS v3.1 base score is 4.3 (medium), reflecting the network attack vector, low complexity, and limited impact confined to confidentiality without affecting integrity or availability. No patches or exploits are currently publicly available, but the exposure of sensitive options can facilitate further attacks such as privilege escalation or targeted exploitation of other vulnerabilities. The vulnerability affects a widely used WordPress plugin, increasing the potential attack surface for websites using this addon for Elementor page builder.
Potential Impact
The primary impact of this vulnerability is the unauthorized disclosure of sensitive configuration data stored in the WordPress wp_options table. Attackers with Contributor-level access can extract arbitrary options, potentially revealing API keys, authentication tokens, or other secrets that could be leveraged for further compromise. While the vulnerability does not directly affect data integrity or site availability, the exposure of sensitive information can lead to secondary attacks such as privilege escalation, lateral movement, or targeted exploitation of other vulnerabilities. Organizations relying on this plugin risk data leakage that could undermine their security posture and lead to reputational damage. Since Contributor-level access is relatively low privilege, this vulnerability expands the threat surface to a broader set of users, including potentially compromised accounts or malicious insiders. The absence of known exploits in the wild reduces immediate risk but does not eliminate the potential for future exploitation once the vulnerability becomes widely known.
Mitigation Recommendations
To mitigate this vulnerability, organizations should first verify if they are running any version of the ElementInvader Addons for Elementor plugin up to 1.3.1 and plan to update to a patched version once available. In the absence of an official patch, administrators should restrict Contributor-level user permissions to trusted individuals only and audit existing user roles to minimize exposure. Disabling or removing the eli_option_value shortcode functionality temporarily can prevent exploitation. Additionally, monitoring access logs for unusual activity involving this shortcode or wp_options table queries can help detect exploitation attempts. Implementing web application firewalls (WAFs) with custom rules to block unauthorized access to the shortcode or suspicious parameter usage may provide interim protection. Regularly reviewing and minimizing sensitive data stored in wp_options can reduce the impact of potential leaks. Finally, educating users about the risks of privilege misuse and enforcing strong authentication controls will further reduce the likelihood of exploitation.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, India, Brazil, France, Netherlands, Japan, South Korea
CVE-2024-12059: CWE-639 Authorization Bypass Through User-Controlled Key in elementinvader ElementInvader Addons for Elementor
Description
CVE-2024-12059 is a medium severity vulnerability in the ElementInvader Addons for Elementor WordPress plugin, affecting all versions up to 1. 3. 1. It allows authenticated users with Contributor-level access or higher to exploit the eli_option_value shortcode to extract arbitrary data from the wp_options database table. This vulnerability is classified as an authorization bypass via a user-controlled key, leading to sensitive information exposure without requiring user interaction. Although it does not impact integrity or availability, the exposure of sensitive configuration data can aid attackers in further attacks. No known exploits are currently reported in the wild. Organizations using this plugin should prioritize updating or applying mitigations to prevent unauthorized data disclosure. The threat primarily affects WordPress sites globally, especially those with Contributor-level user roles enabled. Given the plugin's usage patterns, countries with high WordPress adoption and active web development communities are at greater risk.
AI-Powered Analysis
Technical Analysis
CVE-2024-12059 is a vulnerability identified in the ElementInvader Addons for Elementor plugin for WordPress, affecting all versions up to and including 1.3.1. The flaw arises from improper authorization checks in the eli_option_value shortcode, which allows authenticated users with Contributor-level privileges or higher to retrieve arbitrary option values from the wp_options table. This table typically stores critical site configuration and plugin settings, which can include sensitive information such as API keys, tokens, or other secrets. The vulnerability is categorized under CWE-639 (Authorization Bypass Through User-Controlled Key), indicating that the plugin fails to properly restrict access to sensitive data based on user permissions. Exploitation requires no user interaction beyond authentication at the Contributor level, making it relatively easy for insiders or compromised accounts with limited privileges to escalate their information access. The CVSS v3.1 base score is 4.3 (medium), reflecting the network attack vector, low complexity, and limited impact confined to confidentiality without affecting integrity or availability. No patches or exploits are currently publicly available, but the exposure of sensitive options can facilitate further attacks such as privilege escalation or targeted exploitation of other vulnerabilities. The vulnerability affects a widely used WordPress plugin, increasing the potential attack surface for websites using this addon for Elementor page builder.
Potential Impact
The primary impact of this vulnerability is the unauthorized disclosure of sensitive configuration data stored in the WordPress wp_options table. Attackers with Contributor-level access can extract arbitrary options, potentially revealing API keys, authentication tokens, or other secrets that could be leveraged for further compromise. While the vulnerability does not directly affect data integrity or site availability, the exposure of sensitive information can lead to secondary attacks such as privilege escalation, lateral movement, or targeted exploitation of other vulnerabilities. Organizations relying on this plugin risk data leakage that could undermine their security posture and lead to reputational damage. Since Contributor-level access is relatively low privilege, this vulnerability expands the threat surface to a broader set of users, including potentially compromised accounts or malicious insiders. The absence of known exploits in the wild reduces immediate risk but does not eliminate the potential for future exploitation once the vulnerability becomes widely known.
Mitigation Recommendations
To mitigate this vulnerability, organizations should first verify if they are running any version of the ElementInvader Addons for Elementor plugin up to 1.3.1 and plan to update to a patched version once available. In the absence of an official patch, administrators should restrict Contributor-level user permissions to trusted individuals only and audit existing user roles to minimize exposure. Disabling or removing the eli_option_value shortcode functionality temporarily can prevent exploitation. Additionally, monitoring access logs for unusual activity involving this shortcode or wp_options table queries can help detect exploitation attempts. Implementing web application firewalls (WAFs) with custom rules to block unauthorized access to the shortcode or suspicious parameter usage may provide interim protection. Regularly reviewing and minimizing sensitive data stored in wp_options can reduce the impact of potential leaks. Finally, educating users about the risks of privilege misuse and enforcing strong authentication controls will further reduce the likelihood of exploitation.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2024-12-02T20:36:46.562Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6e2bb7ef31ef0b5972c1
Added to database: 2/25/2026, 9:48:27 PM
Last enriched: 2/26/2026, 6:46:38 AM
Last updated: 2/26/2026, 7:47:11 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25191: Uncontrolled Search Path Element in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-23703: Incorrect default permissions in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-1311: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in bearsthemes Worry Proof Backup
HighFinding Signal in the Noise: Lessons Learned Running a Honeypot with AI Assistance [Guest Diary], (Tue, Feb 24th)
MediumCVE-2026-2506: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motahar1 EM Cost Calculator
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.