CVE-2021-24175
📋 TL;DR
This critical vulnerability in the Plus Addons for Elementor WordPress plugin allows unauthenticated attackers to bypass authentication completely. Attackers can log in as any user (including administrators) by providing only a username, and create accounts with arbitrary roles even when registration is disabled. All WordPress sites using vulnerable versions of this plugin are affected.
💻 Affected Systems
- Plus Addons for Elementor WordPress plugin
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete site takeover where attackers gain administrative access, install backdoors, steal sensitive data, deface the site, or use it for further attacks.
Likely Case
Attackers gain administrative access to compromise the WordPress site, install malware, create backdoor accounts, and potentially pivot to other systems.
If Mitigated
If detected early, impact is limited to temporary site unavailability during cleanup and potential data exposure from the brief compromise period.
🎯 Exploit Status
This vulnerability was actively exploited in the wild as a zero-day before patches were available. Exploitation requires minimal technical skill.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 4.1.7 and later
Vendor Advisory: https://posimyth.ticksy.com/ticket/2713734/
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Plus Addons for Elementor'. 4. Click 'Update Now' if update is available. 5. If no update appears, manually download version 4.1.7+ from WordPress.org and replace the plugin files.
🔧 Temporary Workarounds
Immediate Plugin Deactivation
allTemporarily disable the vulnerable plugin to prevent exploitation while planning permanent fix.
wp plugin deactivate plus-addons-for-elementor
Web Application Firewall Rule
allBlock requests to vulnerable plugin endpoints using WAF rules.
Block requests containing '/wp-content/plugins/plus-addons-for-elementor/' in URI
🧯 If You Can't Patch
- Immediately deactivate the Plus Addons for Elementor plugin via WordPress admin or command line
- Implement strict network access controls to limit access to WordPress admin interface to trusted IPs only
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin → Plugins → Installed Plugins, find 'Plus Addons for Elementor' and verify version is below 4.1.7
Check Version:
wp plugin get plus-addons-for-elementor --field=version
Verify Fix Applied:
Confirm plugin version is 4.1.7 or higher in WordPress admin panel
📡 Detection & Monitoring
Log Indicators:
- Unusual authentication attempts with only username parameter
- User creation events with admin roles from unauthenticated IPs
- Multiple failed login attempts followed by successful admin login from same IP
Network Indicators:
- POST requests to /wp-admin/admin-ajax.php with 'action' parameter containing 'plus' strings
- Requests to plugin-specific endpoints from unauthenticated sources
SIEM Query:
source="wordpress.log" AND (uri_path="/wp-admin/admin-ajax.php" AND (post_data="*plus*" OR post_data="*elementor*")) AND http_status=200
🔗 References
- https://posimyth.ticksy.com/ticket/2713734/
- https://wpscan.com/vulnerability/c311feef-7041-4c21-9525-132b9bd32f89
- https://www.wordfence.com/blog/2021/03/critical-0-day-in-the-plus-addons-for-elementor-allows-site-takeover/
- https://posimyth.ticksy.com/ticket/2713734/
- https://wpscan.com/vulnerability/c311feef-7041-4c21-9525-132b9bd32f89
- https://www.wordfence.com/blog/2021/03/critical-0-day-in-the-plus-addons-for-elementor-allows-site-takeover/