Elementor Header & Footer Builder Vulnerability – Authenticated (Contributor+) Stored Cross-Site Scripting – CVE-2024-33933 | WordPress Plugin Vulnerability Report
Plugin name: Elementor Header & Footer Builder
Key Information:
- Software Type: Plugin
- Software Slug: header-footer-elementor
- Software Status: Active
- Software Author: brainstormforce
- Software Downloads: 30,625,064
- Active Installs: 2,000,000
- Last Updated: July 27, 2024
- Patched Versions: NA
- Affected Versions: <= 1.6.35
Vulnerability Details:
- Name: Elementor – Header, Footer & Blocks Template <= 1.6.35
- Title: Authenticated (Contributor+) Stored Cross-Site Scripting
- Type: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
- CVE: CVE-2024-33933
- CVSS Score: 6.4
- Publicly Published: July 1, 2024
- Researcher: wesley
- Description: The Elementor – Header, Footer & Blocks Template plugin for WordPress is vulnerable to Stored Cross-Site Scripting in versions up to, and including, 1.6.35 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Summary:
The Elementor – Header, Footer & Blocks Template plugin for WordPress has a vulnerability in versions up to and including 1.6.35 that allows authenticated attackers with contributor-level access and above to inject arbitrary web scripts, leading to potential cross-site scripting attacks. This vulnerability has not yet been patched in the plugin's latest available version.
Detailed Overview:
The vulnerability in the Elementor – Header, Footer & Blocks Template plugin was identified by a researcher known as wesley. The issue arises from insufficient input sanitization and output escaping, which enables attackers to inject scripts into web pages. These scripts execute whenever an affected page is accessed, posing significant security risks, including data theft and site defacement. The vulnerability is particularly concerning due to its low complexity and the potential widespread impact given the plugin's large user base.
Advice for Users:
Immediate Action: Users are strongly encouraged to disable the plugin or limit user roles that can access and modify plugin settings until a patch is released.
Check for Signs of Vulnerability: Look for unexpected changes or scripts on pages using the plugin, especially if you have users with contributor-level access.
Alternate Plugins: Consider using alternative plugins with similar functionality, particularly those with a strong security track record and regular updates.
Stay Updated: Always ensure that your plugins are updated to the latest versions to avoid vulnerabilities.
Conclusion:
The discovery of this vulnerability in the Elementor – Header, Footer & Blocks Template plugin highlights the ongoing need for vigilance in managing website security. Users are advised to monitor for updates and consider security audits to safeguard their sites. Staying proactive with updates and security measures is crucial to protect against such vulnerabilities.