VYPR
Medium severity5.3NVD Advisory· Published Aug 19, 2024· Updated Apr 15, 2026

CVE-2024-43281

CVE-2024-43281

Description

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in VOID CODERS Void Elementor Post Grid Addon for Elementor Page builder allows PHP Local File Inclusion.This issue affects Void Elementor Post Grid Addon for Elementor Page builder: from n/a through 2.3.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

CVE-2024-43281 is a path traversal vulnerability in the Void Elementor Post Grid Addon for WordPress, allowing local file inclusion via improper pathname restriction.

Vulnerability

Overview

The Void Elementor Post Grid Addon for Elementor Page Builder plugin for WordPress, in versions up to and including 2.3, contains a path traversal vulnerability. This flaw arises from improper limitation of a pathname to a restricted directory, enabling an attacker to perform PHP local file inclusion. The vulnerability is classified as a Path Traversal (CWE-22) and has been assigned a CVSS v3 score of 5.3 (Medium). [1]

Exploitation

To exploit this vulnerability, an attacker needs to craft a request that includes directory traversal sequences (e.g., ../) in parameters processed by the plugin. The attack does not require authentication, making it accessible to unauthenticated users. Successful exploitation allows the attacker to include arbitrary local PHP files from the server, potentially exposing sensitive information. [1]

Impact

By reading local files, an attacker can disclose sensitive data such as database credentials stored in wp-config.php. If credentials are obtained, it could lead to complete database takeover, compromising the entire WordPress site. The vulnerability is noted as being used in mass-exploit campaigns, targeting thousands of websites regardless of size or popularity. [1]

Mitigation

The vulnerability is patched in version 2.4 of the plugin. Users are strongly advised to update immediately. Patchstack users can enable auto-updates for vulnerable plugins. For those unable to update, consulting a hosting provider or web developer is recommended. The vulnerability is not listed as exploited in the wild (no KEV mention), but proactive patching is crucial. [1]

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.