vulnerability
WordPress Plugin: the-plus-addons-for-elementor-page-builder: CVE-2021-4332: External Control of File Name or Path
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
7 | (AV:N/AC:L/Au:S/C:C/I:N/A:N) | Apr 14, 2021 | May 15, 2025 | May 15, 2025 |
Severity
7
CVSS
(AV:N/AC:L/Au:S/C:C/I:N/A:N)
Published
Apr 14, 2021
Added
May 15, 2025
Modified
May 15, 2025
Description
The Plus Addons for Elementor plugin for WordPress is vulnerable to arbitrary file reads in versions up to, and including 4.1.9 (pro) and 2.0.6 (free). The plugin has a feature to add an "Info Box" to an Elementor created page. This Info Box can include an SVG image for the box. Unfortunately, the plugin used file_get_contents with no verification that the file being supplied was an SVG file, so any user with access to the Elementor page builder, such as contributors, could read arbitrary files on the WordPress installation.
Solution
the-plus-addons-for-elementor-page-builder-plugin-cve-2021-4332

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.