Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-5329: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in unitecms Unlimited Elements For Elementor (Free Widgets, Addons, Templates)

0
High
VulnerabilityCVE-2024-5329cvecve-2024-5329cwe-89
Published: Thu Jun 06 2024 (06/06/2024, 09:34:02 UTC)
Source: CVE Database V5
Vendor/Project: unitecms
Product: Unlimited Elements For Elementor (Free Widgets, Addons, Templates)

Description

CVE-2024-5329 is a high-severity blind SQL Injection vulnerability in the Unlimited Elements For Elementor WordPress plugin, affecting all versions up to 1. 5. 109. It arises from improper sanitization of the 'data[addonID]' parameter, allowing authenticated users with Contributor-level access or higher to inject malicious SQL queries. This flaw enables attackers to extract sensitive database information, potentially compromising confidentiality, integrity, and availability of the affected site. Exploitation requires no user interaction but does require authenticated access, making it a significant risk for sites with multiple contributors. No public exploits are currently known, but the vulnerability's high CVSS score (8. 8) indicates serious impact if weaponized. Organizations using this plugin should prioritize patching or applying mitigations to prevent data breaches and service disruptions. Countries with large WordPress user bases and significant Elementor adoption are at higher risk.

AI-Powered Analysis

AILast updated: 02/26/2026, 02:32:48 UTC

Technical Analysis

CVE-2024-5329 identifies a blind SQL Injection vulnerability in the Unlimited Elements For Elementor plugin for WordPress, specifically in versions up to and including 1.5.109. The vulnerability stems from insufficient escaping and lack of proper preparation of the 'data[addonID]' parameter within SQL queries. Authenticated attackers with Contributor-level privileges or higher can exploit this flaw by injecting additional SQL commands into existing queries. This injection allows attackers to extract sensitive information from the backend database, potentially including user data, configuration details, or other confidential content. The vulnerability does not require user interaction but does require authentication, which lowers the barrier compared to administrator-only exploits. The CVSS 3.1 base score of 8.8 reflects the vulnerability's high impact on confidentiality, integrity, and availability, with network attack vector, low attack complexity, and privileges required. Although no known public exploits are reported yet, the vulnerability's nature and ease of exploitation make it a critical concern for WordPress sites using this plugin. The plugin is widely used in the WordPress ecosystem, especially among sites leveraging Elementor for page building, increasing the potential attack surface. The vulnerability is categorized under CWE-89, indicating improper neutralization of special elements in SQL commands, a common and dangerous injection flaw. No official patches or updates are linked yet, so mitigation may require temporary workarounds or access restrictions until a fix is released.

Potential Impact

The impact of CVE-2024-5329 is significant for organizations running WordPress sites with the Unlimited Elements For Elementor plugin installed. Successful exploitation can lead to unauthorized disclosure of sensitive database contents, including user credentials, personal data, and site configuration. This compromises confidentiality and can facilitate further attacks such as privilege escalation or site takeover. Integrity is at risk as attackers might modify database entries, potentially defacing websites or injecting malicious content. Availability could also be affected if injected queries disrupt normal database operations or cause crashes. Since the vulnerability requires only Contributor-level access, attackers can leverage compromised or malicious user accounts to escalate their impact. This broadens the threat beyond just administrators, increasing the risk in multi-user environments. The absence of known exploits in the wild currently reduces immediate risk, but the high CVSS score and ease of exploitation mean attackers may develop exploits rapidly. Organizations face reputational damage, legal liabilities under data protection regulations, and operational disruptions if this vulnerability is exploited. The widespread use of WordPress and Elementor in various sectors, including e-commerce, media, and corporate websites, amplifies the global risk.

Mitigation Recommendations

To mitigate CVE-2024-5329, organizations should first verify if they use the Unlimited Elements For Elementor plugin and identify the version in use. Immediate steps include restricting Contributor-level user permissions to trusted individuals only, minimizing the risk of exploitation from compromised accounts. Implementing Web Application Firewalls (WAFs) with custom rules to detect and block suspicious SQL injection patterns targeting the 'data[addonID]' parameter can provide temporary protection. Monitoring database query logs for unusual or unexpected queries may help detect exploitation attempts early. Until an official patch is released, consider disabling or removing the plugin if feasible, especially on high-risk or sensitive sites. Site administrators should enforce strong authentication and consider multi-factor authentication to reduce account compromise risk. Regular backups of the database and site files are essential to enable recovery in case of successful exploitation. Stay informed through vendor announcements and security advisories to apply patches promptly once available. Additionally, developers and security teams should review custom code interacting with this plugin to ensure no additional injection vectors exist.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-05-24T17:30:16.718Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6be5b7ef31ef0b55be29

Added to database: 2/25/2026, 9:38:45 PM

Last enriched: 2/26/2026, 2:32:48 AM

Last updated: 2/26/2026, 11:18:15 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats