S4E

CVE-2021-24175 Scanner

CVE-2021-24175 Scanner - Authentication Bypass vulnerability in The Plus Addons for Elementor

Short Info


Level

Critical

Single Scan

Single Scan

Can be used by

Asset Owner

Estimated Time

10 seconds

Time Interval

18 days 3 hours

Scan only one

URL

Toolbox

-

The Plus Addons for Elementor is a premium add-on for Elementor Page Builder, designed to enhance the functionality of websites built with WordPress. It is widely used by web developers and designers who want to create visually appealing and interactive websites with ease. The add-on offers a variety of additional widgets, features, and customization options to suit different design needs. By using this add-on, developers can create a more engaging user experience on their WordPress sites. Being a widely adopted tool, it plays a crucial role in extending the core functionalities of Elementor, especially for users looking for advanced customization. Despite its benefits, an oversight in its security can lead to serious vulnerabilities.

Authentication Bypass is a critical vulnerability that allows an attacker to bypass the usual login process, gaining unauthorized access. This vulnerability is significant because it can lead to full control over an affected installation if exploited. Attackers can exploit this to gain admin access and even create new accounts with elevated roles. This vulnerability typically exploits weaknesses in the authentication mechanisms, allowing attackers to bypass normal login protocols. Due to its severe nature, Authentication Bypass can compromise the integrity, confidentiality, and availability of a system. Protecting against such vulnerabilities is critical to maintaining secure web applications.

In this particular case, the vulnerability in The Plus Addons for Elementor before version 4.1.7 allows attackers to bypass authentication. The vulnerability can be exploited even when the registration feature is disabled and without an active Login widget on the website. The exploit involves manipulating the authentication process to bypass standard login procedures. Attackers take advantage of the insufficient handling of user authentication, allowing unauthorized actions without proper login. As a result of this bypass, attackers can access restricted areas of the website and elevate privileges. This vulnerability is compounded by its ease of exploitation without requiring complex technical skills.

If exploited, this vulnerability can lead to unauthorized access and potentially a complete site takeover. Malicious actors could create accounts with admin privileges, posing a severe risk to site integrity. It can result in unauthorized changes to site content and settings, leading to potential data breaches. The site's reputation may be damaged due to the potential for misuse of the obtained access. User data on the affected site can be compromised, leading to privacy implications. Fixing such breaches often requires extensive remediation measures, including system audits and security restorations.

REFERENCES

Get started to protecting your digital assets