CVE-2024-10980
📋 TL;DR
This vulnerability allows authenticated users with contributor role or higher in WordPress to inject malicious scripts into pages using the Element Pack plugin's Cookie Consent block. The stored XSS payload executes when other users view the affected pages. WordPress sites using vulnerable versions of Element Pack Elementor Addons are affected.
💻 Affected Systems
- Element Pack Elementor Addons WordPress Plugin
📦 What is this software?
Element Pack by Bdthemes
⚠️ Risk & Real-World Impact
Worst Case
Attackers could steal administrator credentials, redirect users to malicious sites, deface websites, or perform actions on behalf of authenticated users.
Likely Case
Contributor-level attackers inject malicious scripts that execute when administrators or other users view affected pages, potentially stealing session cookies or performing limited malicious actions.
If Mitigated
With proper role-based access controls and content sanitization, impact is limited to low-privilege user compromise.
🎯 Exploit Status
Exploitation requires contributor-level WordPress access. Stored XSS payloads persist in page content.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 5.10.3
Vendor Advisory: https://wpscan.com/vulnerability/915daad8-d14c-4457-a3a0-aa21744f4ae0/
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Element Pack Elementor Addons'. 4. Click 'Update Now' if available. 5. Alternatively, download version 5.10.3+ from WordPress repository and manually update.
🔧 Temporary Workarounds
Disable Cookie Consent Block
allTemporarily disable or remove the vulnerable Cookie Consent block from all pages/posts
Restrict Contributor Role
allTemporarily elevate contributor role requirements or restrict content editing permissions
🧯 If You Can't Patch
- Implement strict Content Security Policy (CSP) headers to mitigate XSS impact
- Use web application firewall rules to block suspicious script injection patterns
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin → Plugins → Element Pack Elementor Addons → Version number. If version is below 5.10.3, you are vulnerable.
Check Version:
wp plugin list --name='Element Pack Elementor Addons' --field=version
Verify Fix Applied:
After updating, verify plugin version shows 5.10.3 or higher in WordPress admin panel.
📡 Detection & Monitoring
Log Indicators:
- Unusual content updates by contributor-level users
- Script tags in post/page content containing Cookie Consent blocks
Network Indicators:
- Unexpected script loads from WordPress pages
- Suspicious outbound connections from page views
SIEM Query:
source="wordpress" AND (event="post_updated" OR event="page_updated") AND user_role="contributor" AND content CONTAINS "cookie-consent"