Plugin Name: The Plus Addons for Elementor
Key Information:
- Software Type: Plugin
- Software Slug: the-plus-addons-for-elementor-page-builder
- Software Status: Active
- Software Author: posimyththemes
- Software Downloads: 2,380,817
- Active Installs: 100,000
- Last Updated: May 23, 2024
- Patched Versions: 5.5.5
- Affected Versions: <= 5.5.4
Vulnerability Details:
- Name: Multiple Authenticated (Contributor+) Stored Cross-Site Scripting Vulnerabilities
- Type: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
- CVE: CVE-2024-4485, CVE-2024-4484, CVE-2024-3718, CVE-2024-2784
- CVSS Score: 6.4 (Medium)
- Publicly Published: May 23, 2024
- Researchers: Ngô Thiên An, stealthcopter, Colin Xu
- Description: The The Plus Addons for Elementor plugin for WordPress is vulnerable to multiple Stored Cross-Site Scripting vulnerabilities due to insufficient input sanitization and output escaping. These vulnerabilities allow authenticated attackers with contributor-level access and above to inject arbitrary web scripts that execute whenever a user accesses an injected page.
Summary:
The The Plus Addons for Elementor plugin for WordPress has multiple Stored Cross-Site Scripting vulnerabilities in versions up to and including 5.5.4. These vulnerabilities allow authenticated attackers with contributor-level access and above to inject arbitrary web scripts that execute whenever a user accesses an injected page. The vulnerabilities have been patched in version 5.5.5.
Detailed Overview:
Three security researchers, Ngô Thiên An, stealthcopter, and Colin Xu, discovered multiple Stored Cross-Site Scripting vulnerabilities in The Plus Addons for Elementor plugin. The vulnerabilities stem from insufficient input sanitization and output escaping in various plugin parameters and widgets, including 'button_custom_attributes', 'xai_username', Progress Bar, Header Meta Content, Scroll Navigation, Pricing Table, Flip Box, and Hover Card.
Exploiting these vulnerabilities would allow an authenticated attacker with contributor-level access or above to inject malicious scripts into the affected pages. When a user visits these pages, the injected scripts would execute, potentially leading to sensitive information disclosure, session hijacking, or the delivery of malware.
The plugin developers have addressed these issues in version 5.5.5 by implementing proper input sanitization and output escaping.
Advice for Users:
- Immediate Action: Update The Plus Addons for Elementor plugin to version 5.5.5 or later immediately.
- Check for Signs of Vulnerability: Review your website for any suspicious content or behavior that may indicate a compromised page.
- Alternate Plugins: While a patch is available, users might still consider plugins that offer similar functionality as a precaution.
- Stay Updated: Always ensure that your plugins are updated to the latest versions to avoid vulnerabilities.
The prompt response from the plugin developers to patch these vulnerabilities underscores the importance of timely updates. Users are advised to ensure that they are running version 5.5.5 or later to secure their WordPress installations.
References:
https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/the-plus-addons-for-elementor-page-builder
Vulnerability 1: https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/the-plus-addons-for-elementor-page-builder/the-plus-addons-for-elementor-elementor-addons-page-templates-widgets-mega-menu-woocommerce-552-authenticated-contributor-stored-cross-site-scripting-1
Vulnerability 2: https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/the-plus-addons-for-elementor-page-builder/the-plus-addons-for-elementor-elementor-addons-page-templates-widgets-mega-menu-woocommerce-552-authenticated-contributor-stored-cross-site-scripting
Vulnerability 3: https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/the-plus-addons-for-elementor-page-builder/the-plus-addons-for-elementor-554-authenticated-contributor-stored-cross-site-scripting-via-progress-bar-header-meta-content-scroll-navigation-pricing-table-flip-box
Vulnerability 4: https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/the-plus-addons-for-elementor-page-builder/the-plus-addons-for-elementor-554-authenticated-contibutor-stored-cross-site-scripting-via-hover-card
Detailed Report:
As a website owner, the security of your site should always be a top priority. Keeping your WordPress plugins up to date is a critical aspect of maintaining a secure online presence. Unfortunately, even popular plugins can contain vulnerabilities that put your website at risk. The recent discovery of multiple Stored Cross-Site Scripting (XSS) vulnerabilities in The Plus Addons for Elementor plugin serves as a stark reminder of the importance of staying vigilant and proactive when it comes to website security.
Plugin Details
The Plus Addons for Elementor is a widely-used WordPress plugin with over 100,000 active installations. It offers additional widgets and templates for the popular Elementor page builder. The plugin is developed by posimyththemes and has been downloaded over 2,380,817 times.
Vulnerability Details
Three security researchers, Ngô Thiên An, stealthcopter, and Colin Xu, discovered multiple Stored Cross-Site Scripting vulnerabilities in The Plus Addons for Elementor plugin. The vulnerabilities, identified as CVE-2024-4485, CVE-2024-4484, CVE-2024-3718, and CVE-2024-2784, stem from insufficient input sanitization and output escaping in various plugin parameters and widgets, including 'button_custom_attributes', 'xai_username', Progress Bar, Header Meta Content, Scroll Navigation, Pricing Table, Flip Box, and Hover Card.
These vulnerabilities affect all versions of the plugin up to and including 5.5.4. The plugin developers have addressed these issues in version 5.5.5 by implementing proper input sanitization and output escaping.
Risks and Potential Impacts
Exploiting these vulnerabilities would allow an authenticated attacker with contributor-level access or above to inject malicious scripts into the affected pages. When a user visits these pages, the injected scripts would execute, potentially leading to:
- Sensitive information disclosure
- Session hijacking
- Delivery of malware to website visitors
If left unpatched, these vulnerabilities could lead to a compromised website, loss of user trust, and potential legal and financial repercussions.
How to Remediate the Vulnerability
To mitigate the risks associated with these vulnerabilities, website owners should:
- Update The Plus Addons for Elementor plugin to version 5.5.5 or later immediately.
- Review their website for any suspicious content or behavior that may indicate a compromised page.
- Consider using alternate plugins with similar functionality as a precaution.
- Ensure that all plugins are regularly updated to the latest versions to avoid vulnerabilities.
Previous Vulnerabilities
It's worth noting that The Plus Addons for Elementor plugin has had a history of security issues. Since April 2021, there have been 11 previously reported vulnerabilities in the plugin. This highlights the importance of staying informed about the plugins you use and being prompt in applying security updates.
The Importance of Staying Vigilant
As a small business owner with a WordPress website, it can be challenging to stay on top of security vulnerabilities and updates. However, neglecting these critical aspects of website maintenance can lead to severe consequences for your business. Regularly updating your plugins, themes, and WordPress core is essential to protect your website from potential attacks.
To make this process more manageable, consider implementing the following:
- Enable automatic updates for WordPress core, plugins, and themes.
- Regularly monitor your website for any unusual activity or changes.
- Implement a website backup solution to ensure you can quickly restore your site in case of an attack.
- Partner with a reliable web development or security agency to handle website maintenance and security on your behalf.
By staying informed, proactive, and vigilant, you can significantly reduce the risk of falling victim to plugin vulnerabilities and protect your business's online presence.
Security vulnerabilities like this one demonstrate the importance of having WordPress experts regularly monitor, maintain and update your site. At Your WP Guy, we offer ongoing management to handle updates, security monitoring, backups, uptime and support so you can stop worrying and get back to growing your business.
Let us fully audit your site to check for any signs of this vulnerability or other issues. We'll immediately update any out-of-date plugins and harden your site's security. Chat with us anytime during business hours, schedule a call or call 678-995-5169 to lock down your online presence.