Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-3668: CWE-732 Incorrect Permission Assignment for Critical Resource in PowerPack PowerPack Pro for Elementor

0
High
VulnerabilityCVE-2024-3668cvecve-2024-3668cwe-732
Published: Sat Jun 08 2024 (06/08/2024, 04:32:36 UTC)
Source: CVE Database V5
Vendor/Project: PowerPack
Product: PowerPack Pro for Elementor

Description

CVE-2024-3668 is a high-severity privilege escalation vulnerability in the PowerPack Pro for Elementor WordPress plugin, affecting all versions up to 2. 10. 17. The flaw arises because the plugin does not restrict low-privileged users, such as contributors, from setting the default user role on registration forms. An authenticated attacker with contributor-level access or higher can exploit this by creating a registration form that assigns the administrator role by default, allowing them to register as an administrator. This vulnerability has a CVSS score of 8. 8, indicating a critical impact on confidentiality, integrity, and availability without requiring user interaction. Although no known exploits are currently in the wild, the ease of exploitation and potential for complete site takeover make this a significant threat. Organizations using this plugin should urgently review user permissions and update or patch the plugin once a fix is available. Countries with widespread WordPress usage and significant adoption of Elementor and its add-ons are at higher risk.

AI-Powered Analysis

AILast updated: 02/26/2026, 06:21:51 UTC

Technical Analysis

CVE-2024-3668 is a vulnerability classified under CWE-732 (Incorrect Permission Assignment for Critical Resource) found in the PowerPack Pro for Elementor plugin for WordPress. This plugin, widely used to extend Elementor page builder functionality, contains a critical flaw in its user role assignment logic for registration forms. Specifically, the plugin fails to restrict contributor-level or higher authenticated users from setting the default user role on newly created registration forms. By exploiting this, an attacker with contributor access can create a registration form that assigns the administrator role by default. Subsequently, the attacker can register a new account that immediately has administrator privileges, effectively escalating their privileges from contributor to administrator without requiring any additional authentication or user interaction. The vulnerability affects all versions up to and including 2.10.17. The CVSS v3.1 score of 8.8 reflects the vulnerability's high impact on confidentiality, integrity, and availability, with network attack vector, low attack complexity, and no user interaction required. This vulnerability allows complete site compromise, including the ability to modify content, install backdoors, or pivot to other systems. No public exploits have been reported yet, but the simplicity of the attack and the widespread use of the plugin make it a critical issue for WordPress site administrators.

Potential Impact

The impact of CVE-2024-3668 is severe for organizations using the PowerPack Pro for Elementor plugin. Successful exploitation allows an attacker with minimal privileges (contributor or above) to escalate to administrator privileges, granting full control over the WordPress site. This can lead to unauthorized content modification, data theft, site defacement, installation of malicious plugins or backdoors, and potential lateral movement within the hosting environment. For organizations relying on WordPress for business-critical websites, this could result in significant reputational damage, data breaches, and operational disruption. Since the vulnerability requires only authenticated contributor-level access, any compromised contributor account or insider threat can be leveraged for full site takeover. The absence of required user interaction and the network attack vector further increase the risk of rapid exploitation. This vulnerability could also be used as a foothold for launching further attacks against connected systems or customers.

Mitigation Recommendations

To mitigate CVE-2024-3668, organizations should immediately audit user roles and permissions within their WordPress installations, ensuring that only trusted users have contributor-level or higher access. Restrict contributor roles or temporarily disable registration forms created by contributors until a patch is available. Monitor for suspicious registration forms or unexpected administrator accounts. Apply the vendor's patch or update the PowerPack Pro for Elementor plugin to a fixed version as soon as it is released. If a patch is not yet available, consider disabling or removing the plugin temporarily to eliminate the attack vector. Implement strong authentication and monitoring for all user accounts, especially those with elevated privileges. Employ web application firewalls (WAFs) with custom rules to detect and block attempts to create registration forms with elevated default roles. Regularly review plugin security advisories and maintain an incident response plan for rapid containment in case of exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-04-11T18:49:31.263Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c99b7ef31ef0b566aae

Added to database: 2/25/2026, 9:41:45 PM

Last enriched: 2/26/2026, 6:21:51 AM

Last updated: 2/26/2026, 8:05:14 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats