ElementsKit Pro Vulnerability – Authenticated Sensitive Information Exposure & Stored Cross-Site Scripting – CVE-2024-7063, CVE-2024-7064 | WordPress Plugin Vulnerability Report

Plugin Name: ElementsKit Pro

Key Information:

  • Software Type: Plugin
  • Software Slug: elementskit
  • Software Status: Active
  • Software Author: wpmet
  • Software Downloads: NA
  • Active Installs: 104,000
  • Last Updated: July 24, 2024
  • Patched Versions: 3.6.6, 3.6.7
  • Affected Versions: <= 3.6.6, <= 3.6.5

Vulnerability 1 Details:

  • Name: ElementsKit Pro <= 3.6.6
  • Title: Authenticated (Contributor+) Sensitive Information Exposure
  • Type: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
  • CVE: CVE-2024-7063
  • CVSS Score: 4.3
  • Publicly Published: August 14, 2024
  • Researcher: Webbernaut
  • Description: The ElementsKit Pro plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 3.6.6 via the render_raw function. This vulnerability allows authenticated attackers, with Contributor-level permissions and above, to extract sensitive data, including private, future, and draft posts.

Vulnerability 2 Details:

  • Name: ElementsKit Pro <= 3.6.5
  • Title: Authenticated (Contributor+) Stored Cross-Site Scripting
  • Type: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
  • CVE: CVE-2024-7064
  • CVSS Score: 6.4
  • Publicly Published: August 14, 2024
  • Researcher: Webbernaut
  • Description: The ElementsKit Pro plugin for WordPress is vulnerable to Stored Cross-Site Scripting (XSS) via several parameters in all versions up to, and including, 3.6.5 due to insufficient input sanitization and output escaping. This vulnerability enables authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts into pages, which will execute whenever a user accesses an affected page.

Summary:

The ElementsKit Pro plugin for WordPress has multiple vulnerabilities in versions up to and including 3.6.6 and 3.6.5. The first vulnerability allows authenticated attackers with Contributor-level permissions to extract sensitive data, such as private and draft posts. The second vulnerability enables these attackers to inject malicious scripts into pages, leading to potential Cross-Site Scripting (XSS) attacks. Both vulnerabilities have been patched in versions 3.6.6 and 3.6.7.

Detailed Overview:

The vulnerabilities in ElementsKit Pro were discovered by researcher Webbernaut and were publicly disclosed on August 14, 2024. The first vulnerability, CVE-2024-7063, involves the render_raw function, which lacks proper access control, allowing users with Contributor-level permissions to access sensitive information such as private posts. This exposure of sensitive data can lead to unauthorized disclosure of content that is not intended for public view.

The second vulnerability, CVE-2024-7064, is a Stored Cross-Site Scripting (XSS) issue due to inadequate input sanitization and output escaping. Attackers with Contributor-level access can inject scripts that execute whenever an affected page is viewed, potentially leading to further exploitation or compromise of the site. The plugin developers responded by releasing patches in versions 3.6.6 and 3.6.7, addressing these issues.

Advice for Users:

Immediate Action: Users are strongly encouraged to update their ElementsKit Pro plugin to version 3.6.7 or later to mitigate these vulnerabilities.

Check for Signs of Vulnerability: Review your site for any unauthorized access to sensitive data or unexpected script executions, which could indicate that these vulnerabilities have been exploited.

Alternate Plugins: While the vulnerabilities have been patched, users might consider alternative plugins that provide similar functionality if they have ongoing concerns about security.

Stay Updated: Always ensure that your plugins are updated to the latest versions to avoid vulnerabilities. Monitoring plugin updates and security advisories is crucial for maintaining a secure website.

Conclusion:

The prompt response from the plugin developers to patch these vulnerabilities underscores the importance of timely updates. Users are advised to ensure that they are running version 3.6.7 or later to secure their WordPress installations and protect against potential attacks.

References:

Detailed Report: 

In today’s digital age, maintaining a secure and up-to-date website is crucial for any business, particularly for small business owners who may not have the time to monitor security issues constantly. The recent vulnerabilities discovered in the ElementsKit Pro plugin for WordPress underscore the importance of this task. These vulnerabilities, if left unpatched, could allow attackers to access sensitive information or inject malicious scripts into your website, potentially leading to severe consequences such as data breaches, loss of customer trust, and financial damage.

Vulnerability Details:

Two significant vulnerabilities have been identified in the ElementsKit Pro plugin, affecting versions up to and including 3.6.6 and 3.6.5.

The first vulnerability, CVE-2024-7063, involves an authenticated (Contributor+) sensitive information exposure flaw. Due to insufficient access control in the render_raw function, users with Contributor-level permissions or higher can extract sensitive data such as private, future, and draft posts. This vulnerability, with a CVSS score of 4.3, poses a moderate risk as it could lead to unauthorized disclosure of content that is not intended for public view.

The second vulnerability, CVE-2024-7064, is a stored cross-site scripting (XSS) issue. This vulnerability, rated with a CVSS score of 6.4, is due to inadequate input sanitization and output escaping in several parameters. Attackers with Contributor-level access can inject arbitrary web scripts into pages, which will execute whenever a user accesses an affected page. This can lead to further exploitation, including defacement of the website or compromising user accounts.

Risks and Potential Impacts:

If these vulnerabilities are not addressed, your website could be at significant risk. The exposure of sensitive information could result in the leakage of confidential data, which might include unpublished content or draft posts. This not only violates user privacy but could also damage your business’s reputation if sensitive business information is disclosed.

The stored XSS vulnerability is particularly dangerous as it could be used to inject malicious scripts into your website. These scripts could perform a variety of harmful actions, such as redirecting users to malicious sites, stealing login credentials, or defacing your website. For a small business owner, the impact of such an attack could be devastating, leading to loss of customer trust, financial losses, and a damaged online reputation.

How to Remediate the Vulnerability:

To protect your website from these vulnerabilities, immediate action is required:

  1. Update the Plugin: Ensure that your ElementsKit Pro plugin is updated to version 3.6.7 or later, as these versions contain the necessary patches to address these vulnerabilities.
  2. Check for Signs of Exploitation: Review your website for any unauthorized access to sensitive data or unexpected script executions. This can help you determine if these vulnerabilities have already been exploited.
  3. Consider Alternate Plugins: If you have concerns about the security history of ElementsKit Pro, consider exploring alternative plugins that offer similar functionality but may have a stronger security track record.
  4. Stay Updated: Regularly monitor and update all your WordPress plugins to the latest versions. Enabling automatic updates or subscribing to security advisories can help ensure your site remains secure against future threats.

Overview of Previous Vulnerabilities:

It is important to note that the ElementsKit Pro plugin has a history of security issues, with five previous vulnerabilities reported since April 18, 2024. While these have been addressed by the developers, the recurrence of such issues highlights the need for constant vigilance and regular updates to protect your site from potential threats.

Conclusion:

The discovery and prompt patching of these vulnerabilities by the ElementsKit Pro developers are a reminder of the importance of staying on top of security updates. For small business owners, finding the time to manage these updates can be challenging, but neglecting them can leave your site vulnerable to attacks that could have serious consequences. If you’re concerned about your website’s security or simply don’t have the time to stay on top of these issues, consider seeking professional help to ensure your site remains secure and up to date. Protecting your online presence is essential to maintaining your business’s reputation and customer trust.

Staying Secure

Staying on top of WordPress security can feel overwhelming for small business owners without dedicated IT staff. At Your WP Guy, we exist to shoulder that burden for you. Our WordPress experts can fully audit, secure, maintain and support your site - so you can focus on growing your business with peace of mind.

Don't tackle security risks alone. Let us help you assess any impact from this vulnerability, update your plugins, and implement ongoing maintenance to avoid future threats. We treat your website like it's our own - because we know how critical it is for reaching your customers.

Get in touch for a free consultation today on making WordPress security stress-free. Call 678-995-5169 or book a call here. Our knowledgeable team is ready to help you safeguard your online presence.

ElementsKit Pro Vulnerability – Authenticated Sensitive Information Exposure & Stored Cross-Site Scripting – CVE-2024-7063, CVE-2024-7064 | WordPress Plugin Vulnerability Report FAQs

Leave a Comment