A Local File Inclusion (LFI) vulnerability has been identified in the WordPress Ultimate Addons for WPBakery Page Builder Plugin. This vulnerability could allow a malicious actor to include local files of the target website and show its output on the screen. Files that store credentials, such as database credentials, could potentially allow complete database takeover depending on the configuration.
This vulnerability was discovered and responsibly reported by Rafie Muhammad (Patchstack).
The vulnerability is an LFI vulnerability that occurs in the ultimate-addons-for-wpbakery-page-builder.php file. The vulnerability allows an attacker to exploit a flaw in the way that the plugin handles user input to include arbitrary local files on the website.
The vulnerability has a CVSS 3.1 score of 7.6, which is considered to be high. This means that the vulnerability is likely to be exploited and could have a significant impact on the affected system.
All versions of the Ultimate Addons for WPBakery Page Builder Plugin prior to 3.19.15 are affected by this vulnerability.
An attacker who successfully exploits this vulnerability could:
- Include local files of the target website, such as configuration files, which may contain sensitive information such as database credentials.
- Gain access to sensitive information stored in the website’s files.
- Modify or delete files on the website.
- Take complete control of the website.
To secure a WordPress website effectively, it is imperative to take the following steps:
- Update the Plugin: Immediately update the Ultimate Addons for WPBakery Page Builder Plugin to the latest version, specifically version 3.19.15 or higher. This update contains the necessary security fixes to address the LFI vulnerability.
- Regularly Update Plugins: It’s not just this plugin; make it a practice to regularly update all WordPress plugins and themes to their latest versions. Keeping website components up to date is a fundamental security measure.
- Enhance Security Measures: Consider implementing additional security measures, such as web application firewalls (WAFs), strong authentication protocols, and regular security audits. A comprehensive security strategy is essential to minimize potential exploitation attempts.