Elementor researchers have issued security advisories for 11 separate Elementor add-ons containing 15 vulnerabilities. These vulnerabilities could enable hackers to upload malicious files, and one is rated as a high-threat vulnerability because it could allow hackers to bypass access controls, execute scripts, and access sensitive data.
![Image [1] - Security Vulnerabilities in the Elementor Add-on Plugin and How to Protect Your WordPress Site - Photon Fluctuation.com | Professional WordPress Repair Service, Global Reach, Fast Response](https://www.361sale.com/wp-content/uploads/2024/06/2024061302243633.jpg)
Two different types of vulnerabilities
1. Storing cross-site scripting (XSS)
XSS vulnerabilities are one of the most common forms of vulnerabilities in WordPress plugins and themes. They are usually caused by flaws in the way input data is protected (input cleanup) and the way output data is locked (output escaping).
2. Local File Containment Vulnerability
A local file inclusion vulnerability is a vulnerability that exploits an insecure user input area, allowing an attacker to "include" files in the input. Simply put, this vulnerability allows an attacker to "include" a variety of code that can bypass any restrictions on what can be performed and/or access allowed on a website.
![Image [2] - Security Vulnerabilities in the Elementor Add-on Plugin and How to Protect Your WordPress Site - Photon Fluctuation.com | Professional WordPress Repair Service, Global Reach, Fast Response](https://www.361sale.com/wp-content/uploads/2024/06/2024061309002658.jpg)
List of Vulnerable Elementor Add-ons
In total, 11 Elementor add-ons have reported vulnerabilities, some of which have multiple vulnerabilities. Below is the list of add-ons and their vulnerabilities in descending order from newest to oldest:
- ElementsKit Elementor addons (x2)
- Unlimited Elements For Elementor
- 140+ Widgets | Best Addons For Elementor
- Better Elementor Addons
- Elementor Addon Elements (x2)
- Master Addons for Elementor
- The Plus Addons for Elementor (x2)
- Essential Addons for Elementor (x2)
- Element Pack Elementor Addons
- Prime Slider - Addons For Elementor
- Move Addons for Elementor
![Image [3] - Security Vulnerabilities in the Elementor Add-on Plugin and How to Protect Your WordPress Site - Photon Fluctuation.com | Professional WordPress Repair Service, Worldwide, Fast Response](https://www.361sale.com/wp-content/uploads/2024/06/2024061309005586.jpg)
High Severity Vulnerabilities
The high severity vulnerability found in the ElementsKit Elementor Addons plugin for WordPress is particularly concerning as it could put over a million websites at risk. The vulnerability has a rating of 8.8 (on a scale of 1-10). The plugin's popularity is due to its all-in-one feature that allows users to easily modify almost any page design feature in the header, footer, and menu.
Affected WordPress sites
These vulnerabilities could affect over 3 million websites. The total number of active installations of just two of these plugins is 3 million. Below is a list of vulnerable plugins by number of installations:
- Essential Addons for Elementor - 2 Million
- ElementsKit Elementor addons - 1 Million
- Unlimited Elements For Elementor - 200k
- Elementor Addon Elements - 100k
- The Plus Addons for Elementor - 100k
- Element Pack Elementor Addons - 100k
- Prime Slider - Addons For Elementor - 100k
- Master Addons for Elementor - 40k
- 140+ Widgets | Best Addons For Elementor - 10k
- Move Addons for Elementor - 3k
- Better Elementor Addons - Unknown - Closed By WordPress
![Image [4] - Security Vulnerabilities in the Elementor Add-on Plugin and How to Protect Your WordPress Site - Photon Fluctuation.com | Professional WordPress Repair Service, Global Reach, Fast Response](https://www.361sale.com/wp-content/uploads/2024/06/2024061309013883.jpg)
Recommended Operation
While many medium severity vulnerabilities require hackers to obtain contributor level authentication to launch an attack, the risk posed by other plugins or installed themes should not be underestimated. These plugins or themes may grant attackers the ability to launch these specific attacks. Here are some suggested steps to take:
- Update plugins and themes::
- Make sure all Elementor add-ons and themes are updated to the latest version.
- Test updated themes and plugins before pushing updates to the live site.
- Clearing Cache and Cookies::
- Clear your browser cache and cookies regularly to avoid potential security breaches.
- Using Safe Mode::
- Enable Elementor's "Safe Mode" to separate the core of Elementor from themes and plugins that may cause problems.
- Checking the server connection::
- Ensure that your Internet connection is stable and contact your hosting provider if necessary.
- Enabling CDN::
- Use content delivery networks (CDNs) to distribute web content to servers around the world, reducing the burden on the main server.
- Seek professional support::
- If you are unable to resolve the issue, you can contact the Elementor support team for assistance.
By taking these measures, you can effectively minimize the security risks caused by the vulnerabilities of Elementor add-ons and safeguard the security and stability of your website.
Link to this article:https://www.361sale.com/en/11338
The article is copyrighted and must be reproduced with attribution.
No comments