CVE-2023-32243

9.8 CRITICAL

📋 TL;DR

This vulnerability allows unauthenticated attackers to reset passwords for any user account, including administrators, in WordPress sites using the Essential Addons for Elementor plugin. This affects all WordPress installations running vulnerable versions of the plugin, potentially allowing complete site takeover. The vulnerability is critical due to its unauthenticated nature and high impact.

💻 Affected Systems

Products:
  • Essential Addons for Elementor (WordPress plugin)
Versions: 5.4.0 through 5.7.1
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Affects both free (Lite) and premium versions. Requires WordPress with Elementor plugin installed.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete site compromise where attackers gain administrative access, install backdoors, deface websites, steal sensitive data, or use the site for further attacks.

🟠

Likely Case

Attackers gain administrative privileges and install malicious plugins/themes, create backdoor accounts, or redirect traffic to malicious sites.

🟢

If Mitigated

Attack is detected and blocked before successful exploitation, or impact is limited by additional security controls like WAF rules.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public exploit code available on Packet Storm. Simple HTTP requests can trigger the vulnerability without authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.7.2 and later

Vendor Advisory: https://wordpress.org/plugins/essential-addons-for-elementor-lite/#developers

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Go to Plugins → Installed Plugins. 3. Find 'Essential Addons for Elementor'. 4. Click 'Update Now' if available, or manually update to version 5.7.2+. 5. Verify update completed successfully.

🔧 Temporary Workarounds

Disable vulnerable plugin

all

Temporarily disable the Essential Addons for Elementor plugin until patched

wp plugin deactivate essential-addons-for-elementor-lite

Web Application Firewall rule

all

Block requests to vulnerable endpoints

Block POST requests to /wp-admin/admin-ajax.php with action=reset_password

🧯 If You Can't Patch

  • Implement strict IP-based access controls to WordPress admin areas
  • Enable two-factor authentication for all user accounts, especially administrators

🔍 How to Verify

Check if Vulnerable:

Check WordPress plugin version in admin panel or via wp-cli: wp plugin get essential-addons-for-elementor-lite --field=version

Check Version:

wp plugin get essential-addons-for-elementor-lite --field=version

Verify Fix Applied:

Confirm plugin version is 5.7.2 or higher and test password reset functionality

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed password reset attempts from same IP
  • Unusual admin user password reset activity
  • POST requests to /wp-admin/admin-ajax.php with reset_password action

Network Indicators:

  • HTTP POST requests to WordPress admin-ajax.php endpoint with reset_password parameter
  • Unusual traffic patterns to password reset functionality

SIEM Query:

source="wordpress.log" AND (uri_path="/wp-admin/admin-ajax.php" AND post_data CONTAINS "reset_password")

🔗 References

📤 Share & Export