The Essential Addons for Elementor – Best Elementor Addon, Templates, Widgets, Kits & WooCommerce Builders plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 6.0.9 via the 'init_content_lostpassword_user_email_controls' function. This makes it possible for authenticated attackers, with Author-level access and above, to extract sensitive data including usernames and passwords of any user, including Administrators, as long as that user opens the email notification for a password change request and images are not blocked by the email client.
History

Tue, 19 Nov 2024 17:30:00 +0000

Type Values Removed Values Added
Weaknesses NVD-CWE-noinfo
CPEs cpe:2.3:a:wpdeveloper:essential_addons_for_elementor:*:*:*:*:lite:wordpress:*:*

Fri, 15 Nov 2024 18:15:00 +0000

Type Values Removed Values Added
First Time appeared Wpdeveloper
Wpdeveloper essential Addons For Elementor
CPEs cpe:2.3:a:wpdeveloper:essential_addons_for_elementor:-:*:*:*:*:wordpress:*:*
Vendors & Products Wpdeveloper
Wpdeveloper essential Addons For Elementor
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 15 Nov 2024 09:45:00 +0000

Type Values Removed Values Added
Description The Essential Addons for Elementor – Best Elementor Addon, Templates, Widgets, Kits & WooCommerce Builders plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 6.0.9 via the 'init_content_lostpassword_user_email_controls' function. This makes it possible for authenticated attackers, with Author-level access and above, to extract sensitive data including usernames and passwords of any user, including Administrators, as long as that user opens the email notification for a password change request and images are not blocked by the email client.
Title Essential Addons for Elementor – Best Elementor Addon, Templates, Widgets, Kits & WooCommerce Builders <= 6.0.9 - Authenticated (Author+) Sensitive Information Exposure to Privilege Escalation
Weaknesses CWE-200
References
Metrics cvssV3_1

{'score': 8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published: 2024-11-15T09:29:39.230Z

Updated: 2024-11-15T17:52:51.817Z

Reserved: 2024-09-18T16:40:38.126Z

Link: CVE-2024-8979

cve-icon Vulnrichment

Updated: 2024-11-15T17:52:47.701Z

cve-icon NVD

Status : Analyzed

Published: 2024-11-15T10:15:05.310

Modified: 2024-11-19T17:05:08.270

Link: CVE-2024-8979

cve-icon Redhat

No data.