A high-severity vulnerability was discovered in the Elementor website builder plugin that could allow an attacker to upload files to the website’s server and execute them. The vulnerability is in the template loader functionality.
Elementor Unlimited file upload with dangerous type vulnerability
Elementor website builder is a popular WordPress plugin with over 5 million installs. The popularity is due to its easy to use drag and drop functionality to create professional looking websites.
The vulnerability discovered in Elementor has a rating of 8.8/10 and is said to leave websites using Elementor open to remote code execution through which an attacker is able to essentially take control of the affected website and execute various commands.
The vulnerability type is described as unlimited upload of files with dangerous type. This type of vulnerability is an exploit where an attacker is able to upload malicious files that, in turn, allow commands to be executed on the affected website’s server.
This kind of problem is generally described This way:
“The product allows an attacker to upload or transfer files of a dangerous type that can be automatically processed in the product environment.”
Wordfence describes this specific vulnerability:
“The Elementor Website Builder plugin for WordPress is vulnerable to remote code execution via file upload in all versions up to and including 3.18.0 via the template import functionality.
This makes it possible for authenticated attackers, with access at the contributor level and above, to upload files and execute code on the server.”
Wordfence also states that there is no patch to fix this issue and recommends uninstalling Elementor.
“There is no known patch available. Please review the details of the vulnerability in depth and use mitigations based on your organization’s risk tolerance. It may be best to uninstall the affected software and find a replacement.
Update to Elementor version 3.18.1
Elementor released an update to version 3.18.1 today. It is unclear whether this patch fixes the vulnerability, as the Wordfence site currently states that the vulnerability is not fixed.
The changelog describes this update:
“Fix: Improved code safety enforcement in file upload mechanism”
This is a newly reported vulnerability and facts may change. However, Wordfence warns that hackers are already attacking Elementor websites because its paid version has already blocked eleven hacking attempts at the time of publishing the announcement.
Read the Wordfence notice:
[ad_2]
Source link