🔐 CVE Alert

CVE-2024-4404

HIGH 8.5

ElementsKit PRO <= 3.6.1 - Authenticated (Contributor+) Server-Side Request Forgery

CVSS Score
8.5
EPSS Score
0.0%
EPSS Percentile
0th

The ElementsKit PRO plugin for WordPress is vulnerable to Server-Side Request Forgery in versions up to, and including, 3.6.2 via the 'render_raw' function. This can allow authenticated attackers, with contributor-level permissions and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.

CWE CWE-918
Vendor wpmet
Product elementskit pro
Published Jun 14, 2024
Last Updated Apr 8, 2026
Stay Ahead of the Next One

Get instant alerts for wpmet elementskit pro

Be the first to know when new high vulnerabilities affecting wpmet elementskit pro are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

wpmet / ElementsKit Pro
0 ≤ 3.6.2

References

NVD ↗ CVE.org ↗ EPSS Data ↗
wordfence.com: https://www.wordfence.com/threat-intel/vulnerabilities/id/6417269d-3d49-4f33-b92a-5aacb052bab0?source=cve wpmet.com: https://wpmet.com/plugin/elementskit/roadmaps/

Credits

Ngô Thiên An