Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-49676: Unrestricted Upload of File with Dangerous Type in Michael Bourne Custom Icons for Elementor

0
Unknown
VulnerabilityCVE-2024-49676cvecve-2024-49676
Published: Wed Oct 23 2024 (10/23/2024, 15:31:36 UTC)
Source: CVE Database V5
Vendor/Project: Michael Bourne
Product: Custom Icons for Elementor

Description

Unrestricted Upload of File with Dangerous Type vulnerability in Michael Bourne Custom Icons for Elementor custom-icons-for-elementor allows Upload a Web Shell to a Web Server.This issue affects Custom Icons for Elementor: from n/a through <= 0.3.3.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/02/2026, 07:19:22 UTC

Technical Analysis

CVE-2024-49676 is a critical security vulnerability identified in the Michael Bourne Custom Icons for Elementor WordPress plugin, specifically affecting versions up to and including 0.3.3. The vulnerability allows an attacker to perform an unrestricted upload of files with dangerous types, including web shells, directly to the web server. This occurs because the plugin lacks proper validation and restriction on the types of files that can be uploaded. By exploiting this flaw, an attacker can upload a malicious script that can be executed on the server, leading to remote code execution (RCE). This can compromise the confidentiality, integrity, and availability of the affected web server and potentially the entire hosting environment. The vulnerability does not require authentication or user interaction, making it highly exploitable by remote attackers. The plugin is used in conjunction with Elementor, a popular WordPress page builder, which increases the attack surface due to Elementor's widespread adoption. Although no public exploits have been reported yet, the nature of the vulnerability makes it a prime target for attackers seeking to gain unauthorized access or control over vulnerable websites. The absence of a CVSS score necessitates an expert severity assessment, which indicates a high risk due to the ease of exploitation and potential for severe impact.

Potential Impact

The impact of CVE-2024-49676 is significant for organizations running WordPress sites with the vulnerable Custom Icons for Elementor plugin. Successful exploitation can lead to remote code execution, allowing attackers to execute arbitrary commands on the server. This can result in full server compromise, data theft, defacement, deployment of ransomware, or use of the server as a pivot point for further attacks within the network. The vulnerability threatens the confidentiality of sensitive data stored or processed by the web server, the integrity of website content, and the availability of web services. Small and medium-sized businesses, e-commerce sites, and any organization relying on WordPress for their web presence are at risk. The ease of exploitation without authentication increases the likelihood of automated attacks and mass exploitation campaigns. Additionally, compromised servers can be used to launch attacks against other targets, amplifying the broader security risk.

Mitigation Recommendations

To mitigate CVE-2024-49676, organizations should immediately update the Custom Icons for Elementor plugin to a patched version once available. Until a patch is released, administrators should disable file upload functionality within the plugin or remove the plugin entirely if it is not essential. Implement strict web application firewall (WAF) rules to detect and block attempts to upload executable files or web shells. Employ server-side file type validation and restrict upload directories to prevent execution of uploaded files. Regularly audit web server logs for suspicious upload activity. Harden the web server by disabling execution permissions in upload directories and isolating web applications using containerization or sandboxing techniques. Additionally, maintain regular backups of website data and configurations to enable rapid recovery in case of compromise. Monitoring for indicators of compromise related to web shell activity is also recommended.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2024-10-17T09:52:10.631Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69cd74e3e6bfc5ba1df018d8

Added to database: 4/1/2026, 7:41:23 PM

Last enriched: 4/2/2026, 7:19:22 AM

Last updated: 4/6/2026, 11:30:43 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses