{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2024-6434","assignerOrgId":"b15e7b5b-3da4-40ae-a43c-f7aa60e62599","state":"PUBLISHED","assignerShortName":"Wordfence","dateReserved":"2024-07-01T17:56:21.635Z","datePublished":"2024-07-04T08:32:21.508Z","dateUpdated":"2026-04-08T16:47:24.625Z"},"containers":{"cna":{"providerMetadata":{"orgId":"b15e7b5b-3da4-40ae-a43c-f7aa60e62599","shortName":"Wordfence","dateUpdated":"2026-04-08T16:47:24.625Z"},"affected":[{"vendor":"leap13","product":"Premium Addons for Elementor – Powerful Elementor Templates & Widgets","versions":[{"version":"0","status":"affected","lessThanOrEqual":"4.10.35","versionType":"semver"}],"defaultStatus":"unaffected"}],"descriptions":[{"lang":"en","value":"The Premium Addons for Elementor plugin for WordPress is vulnerable to Regular Expression Denial of Service (ReDoS) in all versions up to, and including, 4.10.35. This is due to processing user-supplied input as a regular expression. This makes it possible for authenticated attackers, with Author-level access and above, to create and query a malicious post title, resulting in slowing server resources."}],"title":"Premium Addons for Elementor <= 4.10.35 - Regular Expressions Denial of Service","references":[{"url":"https://www.wordfence.com/threat-intel/vulnerabilities/id/3c59d95a-b7f1-4a04-bbf4-bab2c42d6d75?source=cve"},{"url":"https://plugins.trac.wordpress.org/browser/premium-addons-for-elementor/trunk/includes/class-premium-template-tags.php#L1676"},{"url":"https://plugins.trac.wordpress.org/changeset/3110991/"}],"problemTypes":[{"descriptions":[{"lang":"en","description":"CWE-400 Uncontrolled Resource Consumption","cweId":"CWE-400","type":"CWE"}]}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L","baseScore":3.1,"baseSeverity":"LOW"}}],"credits":[{"lang":"en","type":"finder","value":"Muhammad Umer Adeem"}],"timeline":[{"time":"2024-07-03T00:00:00.000Z","lang":"en","value":"Disclosed"}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-07-05T13:54:04.582185Z","id":"CVE-2024-6434","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-07-05T13:54:14.363Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-01T21:41:03.413Z"},"title":"CVE Program Container","references":[{"url":"https://www.wordfence.com/threat-intel/vulnerabilities/id/3c59d95a-b7f1-4a04-bbf4-bab2c42d6d75?source=cve","tags":["x_transferred"]},{"url":"https://plugins.trac.wordpress.org/browser/premium-addons-for-elementor/trunk/includes/class-premium-template-tags.php#L1676","tags":["x_transferred"]},{"url":"https://plugins.trac.wordpress.org/changeset/3110991/","tags":["x_transferred"]}]}]}}