This is a summary of the AI-generated 10-question deep analysis. The full version (longer answers, follow-up Q&A, related CVEs) requires login. Read the full analysis β
Q1What is this vulnerability? (Essence + Consequences)
π¨ **Essence**: Local File Inclusion (LFI) in WPZOOM Addons for Elementor. π **Consequences**: Full system compromise. Attackers can read/write files, leading to total server takeover. π Impact is Critical (CVSS High).
Q2Root Cause? (CWE/Flaw)
π‘οΈ **Root Cause**: CWE-22 (Path Traversal). π **Flaw**: The plugin fails to sanitize file paths in AJAX requests.β¦
π₯ **Affected**: WordPress sites using **WPZOOM Addons for Elementor**. π¦ **Version**: 1.1.37 and **earlier** versions. π’ **Vendor**: wpzoom. β οΈ Check your plugin version immediately!
Q4What can hackers do? (Privileges/Data)
π» **Privileges**: Unauthenticated access (No login needed). π **Data**: High Confidentiality, Integrity, and Availability impact. π Hackers can read sensitive config files, inject malware, or execute code.β¦
π **Threshold**: **LOW**. π« **Auth**: None required (PR:N). π **Network**: Remote (AV:N). π€ **UI**: None required (UI:N). π Extremely easy to exploit for anyone with internet access.
Q6Is there a public Exp? (PoC/Wild Exploitation)
π **Public Exp?**: Yes, detailed in references. π **PoC**: Specific file paths (`wpzoom-elementor-ajax-posts-grid.php`) are exposed in WordPress Trac. π **Wild Exp**: Likely active given the low barrier.β¦
π **Self-Check**: Scan for `WPZOOM Addons for Elementor` plugin. π **Version Check**: Is version β€ 1.1.37? π οΈ **Code Audit**: Look for unsanitized input in `includes/wpzoom-elementor-ajax-posts-grid.php`.β¦
π οΈ **Fixed?**: Yes. π **Patch Date**: Published 2024-05-22. π **Action**: Update to the latest version immediately. π Reference: WordPress Trac changeset 3090236 fixes the issue. π Patch is available.
Q9What if no patch? (Workaround)
π§ **No Patch?**: Disable the plugin instantly. π« **Block**: Restrict access to `wp-admin` or AJAX endpoints. π‘οΈ **WAF**: Block requests containing `../` in AJAX parameters. π§Ή Remove the plugin if not essential.β¦