CVE-2024-13353: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in cyberchimps Responsive Addons for Elementor – Free Elementor Addons Plugin and Elementor Templates
CVE-2024-13353 is a high-severity Local File Inclusion (LFI) vulnerability in the Responsive Addons for Elementor WordPress plugin, affecting all versions up to 1. 6. 4. Authenticated users with Contributor-level access or higher can exploit this flaw to include and execute arbitrary files on the server, enabling remote code execution without user interaction. This vulnerability arises from improper control of filenames in include/require statements (CWE-98), allowing attackers to bypass access controls and potentially access sensitive data or execute malicious PHP code. No known public exploits are reported yet, but the ease of exploitation and impact make it a critical concern for WordPress sites using this plugin. Immediate patching or mitigation is essential to prevent compromise.
AI Analysis
Technical Summary
CVE-2024-13353 is a Local File Inclusion vulnerability found in the Responsive Addons for Elementor – Free Elementor Addons Plugin and Elementor Templates plugin for WordPress, affecting all versions up to and including 1.6.4. The vulnerability stems from improper validation and control of filenames used in include or require statements within several widgets of the plugin. This flaw allows authenticated attackers with at least Contributor-level privileges to manipulate the file inclusion process, enabling them to include arbitrary files from the server. Since WordPress Contributor roles can upload certain file types such as images, attackers can upload files containing PHP code disguised as safe file types and then include and execute them via this vulnerability. This leads to remote code execution on the server, bypassing normal access controls. The vulnerability is classified under CWE-98 (Improper Control of Filename for Include/Require Statement). The CVSS v3.1 base score is 8.8 (high), reflecting network attack vector, low attack complexity, required privileges (low), no user interaction, and high impact on confidentiality, integrity, and availability. Although no known exploits are publicly reported yet, the vulnerability poses a significant risk to WordPress sites using this plugin, especially those with multiple contributors or less restrictive user role management. The lack of a patch at the time of reporting increases the urgency for mitigation.
Potential Impact
The impact of CVE-2024-13353 is severe for organizations running WordPress sites with the affected Responsive Addons for Elementor plugin. Successful exploitation allows attackers to execute arbitrary PHP code on the web server, leading to full compromise of the affected site. This can result in unauthorized access to sensitive data, defacement, installation of backdoors or malware, and use of the compromised server as a pivot point for further attacks within the network. Since Contributor-level users can exploit this flaw, insider threats or compromised contributor accounts significantly increase risk. The vulnerability undermines the integrity and availability of the website and can damage organizational reputation, lead to data breaches, and cause operational disruptions. Given WordPress's widespread use globally, the threat has broad implications for businesses, government agencies, and other entities relying on this CMS and plugin ecosystem.
Mitigation Recommendations
Organizations should immediately audit their WordPress installations for the presence of the Responsive Addons for Elementor plugin and verify the version in use. Until an official patch is released, consider the following mitigations: 1) Restrict user roles and permissions to minimize the number of users with Contributor-level or higher access; 2) Disable or remove the vulnerable plugin if it is not essential; 3) Implement web application firewall (WAF) rules to detect and block suspicious file inclusion attempts targeting the plugin's widgets; 4) Restrict file upload types and scan uploaded files for malicious content; 5) Monitor logs for unusual file inclusion or PHP execution patterns; 6) Employ principle of least privilege for all WordPress users; 7) Prepare for rapid patching once an official fix is available from the vendor. Additionally, consider isolating WordPress instances and backing up data regularly to enable recovery from compromise.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, India, France, Brazil, Netherlands, Japan, Italy, Spain
CVE-2024-13353: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in cyberchimps Responsive Addons for Elementor – Free Elementor Addons Plugin and Elementor Templates
Description
CVE-2024-13353 is a high-severity Local File Inclusion (LFI) vulnerability in the Responsive Addons for Elementor WordPress plugin, affecting all versions up to 1. 6. 4. Authenticated users with Contributor-level access or higher can exploit this flaw to include and execute arbitrary files on the server, enabling remote code execution without user interaction. This vulnerability arises from improper control of filenames in include/require statements (CWE-98), allowing attackers to bypass access controls and potentially access sensitive data or execute malicious PHP code. No known public exploits are reported yet, but the ease of exploitation and impact make it a critical concern for WordPress sites using this plugin. Immediate patching or mitigation is essential to prevent compromise.
AI-Powered Analysis
Technical Analysis
CVE-2024-13353 is a Local File Inclusion vulnerability found in the Responsive Addons for Elementor – Free Elementor Addons Plugin and Elementor Templates plugin for WordPress, affecting all versions up to and including 1.6.4. The vulnerability stems from improper validation and control of filenames used in include or require statements within several widgets of the plugin. This flaw allows authenticated attackers with at least Contributor-level privileges to manipulate the file inclusion process, enabling them to include arbitrary files from the server. Since WordPress Contributor roles can upload certain file types such as images, attackers can upload files containing PHP code disguised as safe file types and then include and execute them via this vulnerability. This leads to remote code execution on the server, bypassing normal access controls. The vulnerability is classified under CWE-98 (Improper Control of Filename for Include/Require Statement). The CVSS v3.1 base score is 8.8 (high), reflecting network attack vector, low attack complexity, required privileges (low), no user interaction, and high impact on confidentiality, integrity, and availability. Although no known exploits are publicly reported yet, the vulnerability poses a significant risk to WordPress sites using this plugin, especially those with multiple contributors or less restrictive user role management. The lack of a patch at the time of reporting increases the urgency for mitigation.
Potential Impact
The impact of CVE-2024-13353 is severe for organizations running WordPress sites with the affected Responsive Addons for Elementor plugin. Successful exploitation allows attackers to execute arbitrary PHP code on the web server, leading to full compromise of the affected site. This can result in unauthorized access to sensitive data, defacement, installation of backdoors or malware, and use of the compromised server as a pivot point for further attacks within the network. Since Contributor-level users can exploit this flaw, insider threats or compromised contributor accounts significantly increase risk. The vulnerability undermines the integrity and availability of the website and can damage organizational reputation, lead to data breaches, and cause operational disruptions. Given WordPress's widespread use globally, the threat has broad implications for businesses, government agencies, and other entities relying on this CMS and plugin ecosystem.
Mitigation Recommendations
Organizations should immediately audit their WordPress installations for the presence of the Responsive Addons for Elementor plugin and verify the version in use. Until an official patch is released, consider the following mitigations: 1) Restrict user roles and permissions to minimize the number of users with Contributor-level or higher access; 2) Disable or remove the vulnerable plugin if it is not essential; 3) Implement web application firewall (WAF) rules to detect and block suspicious file inclusion attempts targeting the plugin's widgets; 4) Restrict file upload types and scan uploaded files for malicious content; 5) Monitor logs for unusual file inclusion or PHP execution patterns; 6) Employ principle of least privilege for all WordPress users; 7) Prepare for rapid patching once an official fix is available from the vendor. Additionally, consider isolating WordPress instances and backing up data regularly to enable recovery from compromise.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-01-13T15:23:33.616Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6e51b7ef31ef0b59e268
Added to database: 2/25/2026, 9:49:05 PM
Last enriched: 2/26/2026, 1:26:11 AM
Last updated: 2/26/2026, 7:39:56 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25191: Uncontrolled Search Path Element in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-23703: Incorrect default permissions in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-1311: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in bearsthemes Worry Proof Backup
HighCVE-2026-2506: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motahar1 EM Cost Calculator
MediumCVE-2026-2499: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in tgrk Custom Logo
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.