Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-4359: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in bdthemes Element Pack Elementor Addons (Header Footer, Template Library, Dynamic Grid & Carousel, Remote Arrows)

0
Medium
VulnerabilityCVE-2024-4359cvecve-2024-4359cwe-98
Published: Fri Aug 09 2024 (08/09/2024, 04:29:50 UTC)
Source: CVE Database V5
Vendor/Project: bdthemes
Product: Element Pack Elementor Addons (Header Footer, Template Library, Dynamic Grid & Carousel, Remote Arrows)

Description

CVE-2024-4359 is a medium severity vulnerability in the bdthemes Element Pack Elementor Addons plugin for WordPress, affecting all versions up to 5. 7. 2. It arises from improper control of filenames in the render_svg function used by the SVG widget, allowing authenticated users with contributor-level access or higher to perform arbitrary file reads on the server. This can expose sensitive information stored in server files. The vulnerability does not require user interaction beyond authentication and has no known exploits in the wild as of now. The CVSS score is 6. 5, reflecting high confidentiality impact but no integrity or availability impact. Organizations using this plugin should prioritize patching or mitigating this flaw to prevent information disclosure. The threat primarily affects WordPress sites using this plugin globally, with particular risk in countries with high WordPress adoption and active web content management.

AI-Powered Analysis

AILast updated: 02/26/2026, 00:37:49 UTC

Technical Analysis

CVE-2024-4359 is a vulnerability classified under CWE-98 (Improper Control of Filename for Include/Require Statement) affecting the bdthemes Element Pack Elementor Addons plugin for WordPress, specifically versions up to and including 5.7.2. The flaw exists in the render_svg function utilized by the SVG widget, where insufficient validation of file paths allows an authenticated attacker with contributor-level or higher permissions to read arbitrary files on the server. This is a remote file inclusion-related vulnerability but limited to authenticated users, as it requires contributor-level access. The attacker can exploit this to disclose sensitive server files, potentially including configuration files, credentials, or other private data, without affecting system integrity or availability. The vulnerability has a CVSS v3.1 base score of 6.5, indicating a medium severity with a high confidentiality impact (C:H), low attack complexity (AC:L), and no user interaction (UI:N). No known public exploits have been reported yet. The vulnerability affects all versions of the plugin prior to a fix, and no official patch links are currently available. The risk is heightened in environments where contributor roles are widely assigned or where sensitive information is stored on the web server. This vulnerability highlights the importance of strict input validation and access control in WordPress plugins handling file operations.

Potential Impact

The primary impact of CVE-2024-4359 is unauthorized disclosure of sensitive information due to arbitrary file read capabilities granted to authenticated users with contributor-level access or higher. This can lead to exposure of configuration files, database credentials, API keys, or other sensitive data stored on the server, potentially facilitating further attacks such as privilege escalation or lateral movement. While the vulnerability does not allow code execution or denial of service, the confidentiality breach can be severe, especially for organizations hosting sensitive or regulated data. The scope includes any WordPress site using the affected plugin versions, which could be widespread given the popularity of Elementor and its addons. Attackers exploiting this vulnerability could gain insights into the server environment, increasing the risk of targeted attacks. The medium severity rating reflects the balance between the need for authentication and the high impact of data disclosure. Organizations with multiple contributors or less restrictive role assignments are at greater risk. The absence of known exploits in the wild currently limits immediate threat but does not diminish the urgency of remediation.

Mitigation Recommendations

To mitigate CVE-2024-4359, organizations should immediately audit and restrict contributor-level access to trusted users only, minimizing the attack surface. Implement strict role-based access controls and monitor contributor activities for suspicious file access patterns. Disable or remove the vulnerable SVG widget if not essential. Employ web application firewalls (WAFs) with custom rules to detect and block attempts to exploit file inclusion or path traversal patterns targeting the plugin. Regularly review server file permissions to ensure sensitive files are not world-readable. Since no official patch is currently available, consider applying temporary code-level mitigations such as adding strict input validation and sanitization in the render_svg function to restrict file paths to safe directories. Stay informed on vendor updates and apply official patches promptly once released. Additionally, conduct regular security assessments and vulnerability scans focusing on WordPress plugins to detect similar issues early.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-04-30T18:10:27.847Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6b88b7ef31ef0b556590

Added to database: 2/25/2026, 9:37:12 PM

Last enriched: 2/26/2026, 12:37:49 AM

Last updated: 2/26/2026, 6:18:23 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats