CVE-2024-11829

6.4 MEDIUM

📋 TL;DR

This vulnerability allows authenticated attackers with Contributor-level access or higher to inject malicious scripts into WordPress pages using the Table Widget in The Plus Addons for Elementor plugin. The scripts are stored and execute whenever users access the compromised pages, enabling cross-site scripting attacks. All WordPress sites using vulnerable plugin versions are affected.

💻 Affected Systems

Products:
  • The Plus Addons for Elementor – Elementor Addons, Page Templates, Widgets, Mega Menu, WooCommerce
Versions: All versions up to and including 6.1.8
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress with Elementor and the vulnerable plugin installed. Contributor-level or higher user access is needed for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator credentials, perform session hijacking, deface websites, redirect users to malicious sites, or install malware on visitors' systems.

🟠

Likely Case

Attackers with contributor access inject malicious scripts to steal user session cookies, perform phishing attacks, or deface specific pages.

🟢

If Mitigated

With proper user role management and input validation, impact is limited to low-privilege data exposure from contributor-level accounts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward once an attacker has contributor-level credentials.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.2.0

Vendor Advisory: https://plugins.trac.wordpress.org/changeset?old_path=/the-plus-addons-for-elementor-page-builder/tags/6.1.8&new_path=/the-plus-addons-for-elementor-page-builder/tags/6.2.0

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'The Plus Addons for Elementor'. 4. Click 'Update Now' if available, or download version 6.2.0+ from WordPress repository. 5. Activate the updated plugin.

🔧 Temporary Workarounds

Disable Table Widget

all

Temporarily disable the vulnerable Table Widget component until patching is possible

Navigate to Elementor → The Plus Addons → Modules Control → Disable 'TP Table' widget

Restrict User Roles

all

Temporarily remove contributor-level editing permissions from untrusted users

Navigate to Users → All Users → Edit user roles to remove 'Contributor' access

🧯 If You Can't Patch

  • Implement strict Content Security Policy (CSP) headers to limit script execution
  • Enable WordPress security plugins with XSS protection features like Wordfence or Sucuri

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → The Plus Addons for Elementor → Version number. If version is 6.1.8 or lower, you are vulnerable.

Check Version:

wp plugin list --name='the-plus-addons-for-elementor' --field=version

Verify Fix Applied:

After updating, verify version shows 6.2.0 or higher in WordPress plugins list.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /wp-admin/admin-ajax.php with searchable_label parameters
  • Multiple failed login attempts followed by successful contributor-level login

Network Indicators:

  • Unexpected JavaScript payloads in HTTP POST parameters
  • Suspicious outbound connections from WordPress admin pages

SIEM Query:

source="wordpress" AND (uri_path="/wp-admin/admin-ajax.php" AND http_method="POST" AND params CONTAINS "searchable_label")

🔗 References

📤 Share & Export