Jeg Elementor Kit Vulnerability – Authenticated (Contributor+) Stored Cross-Site Scripting via JKit – Tabs and JKit – Accordion Widgets – CVE-2024-4479 | WordPress Plugin Vulnerability Report
Plugin Name: Jeg Elementor Kit
Key Information:
- Software Type: Plugin
- Software Slug: jeg-elementor-kit
- Software Status: Active
- Software Author: jegtheme
- Software Downloads: 1,393,902
- Active Installs: 200,000
- Last Updated: July 2, 2024
- Patched Versions: 2.6.6
- Affected Versions: <= 2.6.5
Vulnerability Details:
- Name: Jeg Elementor Kit <= 2.6.5
- Title: Authenticated (Contributor+) Stored Cross-Site Scripting via JKit - Tabs and JKit - Accordion Widgets
- Type: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
- CVE: CVE-2024-4479
- CVSS Score: 6.4
- Publicly Published: June 14, 2024
- Researcher: wesley
- Description: The Jeg Elementor Kit plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the sg_general_toggle_tab_enable and sg_accordion_style attributes within the plugin's JKit - Tabs and JKit - Accordion widget, respectively, in all versions up to, and including, 2.6.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Summary:
The Jeg Elementor Kit for WordPress has a vulnerability in versions up to and including 2.6.5 that allows authenticated attackers with Contributor-level access and above to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This vulnerability has been patched in version 2.6.6.
Detailed Overview:
The vulnerability in the Jeg Elementor Kit plugin, identified by researcher wesley, is located in the sg_general_toggle_tab_enable and sg_accordion_style attributes within the JKit - Tabs and JKit - Accordion widgets. This flaw is due to insufficient input sanitization and output escaping, allowing authenticated attackers with Contributor-level access and above to inject arbitrary web scripts. These scripts will execute whenever a user accesses a page containing the injected scripts. The risks of this vulnerability include the potential for attackers to perform actions on behalf of other users, access sensitive information, and compromise site integrity. The vulnerability has been addressed in version 2.6.6.
Advice for Users:
- Immediate Action: Users are strongly encouraged to update to the patched version 2.6.6 immediately to mitigate the vulnerability.
- Check for Signs of Vulnerability: Users should check their websites for any unexpected or suspicious scripts and review user accounts for unauthorized changes.
- Alternate Plugins: While a patch is available, users might consider using alternate plugins that offer similar functionality as a precaution.
- Stay Updated: Always ensure that your plugins are updated to the latest versions to avoid vulnerabilities.
Conclusion:
The prompt response from the plugin developers to patch this vulnerability underscores the importance of timely updates. Users are advised to ensure that they are running version 2.6.6 or later to secure their WordPress installations.