CVE-2023-39993

4.3 MEDIUM

📋 TL;DR

This CVE describes a Missing Authorization vulnerability in the Wpmet Elements Kit Elementor addons plugin for WordPress. It allows unauthorized users to access functionality intended only for authenticated administrators. All WordPress sites using Elements Kit Elementor addons version 2.9.0 or earlier are affected.

💻 Affected Systems

Products:
  • Wpmet Elements Kit Elementor addons (ElementsKit Lite)
Versions: All versions up to and including 2.9.0
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects WordPress installations with the vulnerable plugin activated.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Unauthenticated attackers could modify plugin settings, inject malicious content, or potentially escalate privileges to gain administrative control of the WordPress site.

🟠

Likely Case

Attackers could modify plugin configurations, add malicious widgets or content to pages, or disrupt site functionality.

🟢

If Mitigated

With proper access controls and network segmentation, impact would be limited to unauthorized configuration changes within the plugin's scope.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Missing authorization vulnerabilities typically require minimal technical skill to exploit once the attack vector is identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.9.1 or later

Vendor Advisory: https://patchstack.com/database/vulnerability/elementskit-lite/wordpress-elementskit-lite-plugin-2-9-0-broken-access-control-vulnerability

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'ElementsKit Lite' and check for updates. 4. If update is available, click 'Update Now'. 5. Alternatively, download version 2.9.1+ from WordPress.org and manually update.

🔧 Temporary Workarounds

Disable vulnerable plugin

all

Temporarily deactivate the ElementsKit Lite plugin until patched

Restrict admin access

all

Implement IP whitelisting for WordPress admin area

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block unauthorized access to plugin endpoints
  • Enable WordPress security plugins that monitor for unauthorized access attempts

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins → ElementsKit Lite → Version. If version is 2.9.0 or earlier, you are vulnerable.

Check Version:

wp plugin list --name=elementskit-lite --field=version

Verify Fix Applied:

After updating, verify the plugin version shows 2.9.1 or higher in WordPress admin.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized POST requests to /wp-admin/admin-ajax.php with 'action' parameter containing 'elementskit' patterns
  • 403 errors followed by successful 200 responses to admin endpoints

Network Indicators:

  • Unusual traffic to /wp-admin/admin-ajax.php from non-admin IP addresses
  • POST requests with elementskit-related parameters from unauthorized sources

SIEM Query:

source="wordpress.log" AND (uri_path="/wp-admin/admin-ajax.php" AND http_method=POST AND (query="*action=elementskit*" OR form_data="*elementskit*")) AND NOT src_ip IN admin_ip_list

🔗 References

📤 Share & Export