CVE-2024-10980

5.4 MEDIUM

📋 TL;DR

This vulnerability allows authenticated users with contributor role or higher in WordPress to inject malicious scripts into pages using the Element Pack plugin's Cookie Consent block. The stored XSS payload executes when other users view the affected pages. WordPress sites using vulnerable versions of Element Pack Elementor Addons are affected.

💻 Affected Systems

Products:
  • Element Pack Elementor Addons WordPress Plugin
Versions: All versions before 5.10.3
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress with Element Pack plugin installed and contributor or higher role access.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator credentials, redirect users to malicious sites, deface websites, or perform actions on behalf of authenticated users.

🟠

Likely Case

Contributor-level attackers inject malicious scripts that execute when administrators or other users view affected pages, potentially stealing session cookies or performing limited malicious actions.

🟢

If Mitigated

With proper role-based access controls and content sanitization, impact is limited to low-privilege user compromise.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires contributor-level WordPress access. Stored XSS payloads persist in page content.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.10.3

Vendor Advisory: https://wpscan.com/vulnerability/915daad8-d14c-4457-a3a0-aa21744f4ae0/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Element Pack Elementor Addons'. 4. Click 'Update Now' if available. 5. Alternatively, download version 5.10.3+ from WordPress repository and manually update.

🔧 Temporary Workarounds

Disable Cookie Consent Block

all

Temporarily disable or remove the vulnerable Cookie Consent block from all pages/posts

Restrict Contributor Role

all

Temporarily elevate contributor role requirements or restrict content editing permissions

🧯 If You Can't Patch

  • Implement strict Content Security Policy (CSP) headers to mitigate XSS impact
  • Use web application firewall rules to block suspicious script injection patterns

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Element Pack Elementor Addons → Version number. If version is below 5.10.3, you are vulnerable.

Check Version:

wp plugin list --name='Element Pack Elementor Addons' --field=version

Verify Fix Applied:

After updating, verify plugin version shows 5.10.3 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual content updates by contributor-level users
  • Script tags in post/page content containing Cookie Consent blocks

Network Indicators:

  • Unexpected script loads from WordPress pages
  • Suspicious outbound connections from page views

SIEM Query:

source="wordpress" AND (event="post_updated" OR event="page_updated") AND user_role="contributor" AND content CONTAINS "cookie-consent"

🔗 References

📤 Share & Export