CVE-2022-45831

7.1 HIGH

📋 TL;DR

Unauthenticated reflected cross-site scripting (XSS) vulnerability in the Image Hover Effects for Elementor WordPress plugin allows attackers to inject malicious scripts via crafted URLs. This affects WordPress sites using plugin versions 2.8 and earlier, potentially compromising visitor sessions and site integrity.

💻 Affected Systems

Products:
  • Image Hover Effects for Elementor with Lightbox and Flipbox WordPress plugin
Versions: <= 2.8
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects WordPress installations with the vulnerable plugin active.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator session cookies, perform actions as administrators, deface websites, or redirect visitors to malicious sites.

🟠

Likely Case

Attackers inject malicious JavaScript to steal user session cookies or credentials, potentially gaining unauthorized access to WordPress admin panels.

🟢

If Mitigated

With proper input validation and output encoding, malicious scripts would be neutralized before execution.

🌐 Internet-Facing: HIGH - WordPress sites are typically internet-facing, and unauthenticated exploitation requires only a crafted URL.
🏢 Internal Only: LOW - Internal-only WordPress sites reduce exposure, but the vulnerability remains if accessible internally.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Reflected XSS typically requires tricking users into clicking malicious links, but exploitation is straightforward.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: > 2.8

Vendor Advisory: https://patchstack.com/database/vulnerability/image-hover-effects-with-carousel/wordpress-image-hover-effects-caption-hover-with-carousel-plugin-2-8-cross-site-scripting-xss

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'Image Hover Effects for Elementor' and update to latest version. 4. Verify update completes successfully.

🔧 Temporary Workarounds

Disable vulnerable plugin

all

Temporarily deactivate the plugin until patched.

wp plugin deactivate image-hover-effects-with-carousel

Implement WAF rules

all

Configure web application firewall to block XSS payloads targeting the vulnerable endpoint.

🧯 If You Can't Patch

  • Implement Content Security Policy (CSP) headers to restrict script execution sources.
  • Use browser security features like HttpOnly and Secure flags for cookies to limit session theft.

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Installed Plugins for 'Image Hover Effects for Elementor' version 2.8 or lower.

Check Version:

wp plugin get image-hover-effects-with-carousel --field=version

Verify Fix Applied:

Confirm plugin version is greater than 2.8 in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual GET requests with JavaScript payloads in query parameters to plugin endpoints.
  • Multiple failed login attempts following suspicious URL visits.

Network Indicators:

  • HTTP requests containing script tags or JavaScript in URL parameters to WordPress site.

SIEM Query:

source="web_server" AND (url="*image-hover-effects*" AND (url="*<script>*" OR url="*javascript:*"))

🔗 References

📤 Share & Export