CVE-2024-8979

The Essential Addons for Elementor – Best Elementor Addon, Templates, Widgets, Kits & WooCommerce Builders plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 6.0.9 via the 'init_content_lostpassword_user_email_controls' function. This makes it possible for authenticated attackers, with Author-level access and above, to extract sensitive data including usernames and passwords of any user, including Administrators, as long as that user opens the email notification for a password change request and images are not blocked by the email client.
Configurations

Configuration 1 (hide)

cpe:2.3:a:wpdeveloper:essential_addons_for_elementor:*:*:*:*:lite:wordpress:*:*

History

19 Nov 2024, 17:05

Type Values Removed Values Added
CWE NVD-CWE-noinfo
First Time Wpdeveloper essential Addons For Elementor
Wpdeveloper
CVSS v2 : unknown
v3 : 8.0
v2 : unknown
v3 : 5.7
CPE cpe:2.3:a:wpdeveloper:essential_addons_for_elementor:*:*:*:*:lite:wordpress:*:*
References () https://plugins.trac.wordpress.org/browser/essential-addons-for-elementor-lite/trunk/includes/Elements/Login_Register.php#L2440 - () https://plugins.trac.wordpress.org/browser/essential-addons-for-elementor-lite/trunk/includes/Elements/Login_Register.php#L2440 - Product
References () https://plugins.trac.wordpress.org/changeset/3188634/ - () https://plugins.trac.wordpress.org/changeset/3188634/ - Product
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/34d09086-be33-40cf-b5bf-d6c03cf0b68a?source=cve - () https://www.wordfence.com/threat-intel/vulnerabilities/id/34d09086-be33-40cf-b5bf-d6c03cf0b68a?source=cve - Third Party Advisory

15 Nov 2024, 13:58

Type Values Removed Values Added
Summary
  • (es) Los complementos Essential Addons for Elementor – Best Elementor Addon, Templates, Widgets, Kits & WooCommerce Builders para Elementor son vulnerables a la exposición de información confidencial en todas las versiones hasta la 6.0.9 incluida a través de la función 'init_content_lostpassword_user_email_controls'. Esto permite que los atacantes autenticados, con acceso de nivel de autor y superior, extraigan datos confidenciales, incluidos los nombres de usuario y las contraseñas de cualquier usuario, incluidos los administradores, siempre que ese usuario abra la notificación por correo electrónico para solicitar un cambio de contraseña y las imágenes no estén bloqueadas por el cliente de correo electrónico.

15 Nov 2024, 10:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-11-15 10:15

Updated : 2024-11-19 17:05


NVD link : CVE-2024-8979

Mitre link : CVE-2024-8979

CVE.ORG link : CVE-2024-8979


JSON object : View

Products Affected

wpdeveloper

  • essential_addons_for_elementor
CWE
NVD-CWE-noinfo CWE-200

Exposure of Sensitive Information to an Unauthorized Actor