CVE-2024-43271
WordPress vulnerability analysis and mitigation

Overview

A Local File Inclusion vulnerability (CVE-2024-43271) was discovered in the WordPress plugin 'Widgets for WooCommerce Products on Elementor' affecting versions up to 2.0.4. The vulnerability was reported on June 10, 2024, by João Pedro S Alcântara (Kinorth) and published by Patchstack on August 14, 2024. This security issue allows for path traversal and PHP Local File Inclusion in the plugin (Patchstack).

Technical details

The vulnerability is classified as an Improper Limitation of a Pathname to a Restricted Directory (Path Traversal) issue, identified as CWE-22. It received a CVSS v3.1 base score of 8.5 (HIGH) with the vector string CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H. The vulnerability requires Contributor or higher privileges to exploit (Patchstack).

Impact

The vulnerability could allow a malicious actor to include local files of the target website and display their contents. This could potentially expose sensitive information such as database credentials, which depending on the configuration, might lead to complete database compromise (Patchstack).

Mitigation and workarounds

Currently, there is no official fix available for this vulnerability. The issue affects versions up to 2.0.4 of the Widgets for WooCommerce Products on Elementor plugin (Patchstack).

Additional resources


SourceThis report was generated using AI

Related WordPress vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-13342CRITICAL9.8
  • acf-frontend-form-element
NoYesDec 03, 2025
CVE-2025-13359MEDIUM6.5
  • simple-tags
NoYesDec 03, 2025
CVE-2025-13756MEDIUM4.3
  • fluent-booking
NoYesDec 03, 2025
CVE-2025-13354MEDIUM4.3
  • simple-tags
NoYesDec 03, 2025
CVE-2025-13109MEDIUM4.3
  • woocommerce-products-filter
NoYesDec 03, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management