CVE-2024-12239

6.1 MEDIUM

📋 TL;DR

This vulnerability allows unauthenticated attackers to inject malicious scripts via the navigate parameter in PowerPack Lite for Beaver Builder WordPress plugin. When an administrative user clicks a specially crafted link, the script executes in their browser context. All WordPress sites using this plugin up to version 1.3.0.5 are affected.

💻 Affected Systems

Products:
  • PowerPack Lite for Beaver Builder WordPress plugin
Versions: All versions up to and including 1.3.0.5
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress with the vulnerable plugin installed. The navigate parameter must be accessible, which appears to be in admin interfaces.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Administrator account compromise leading to full site takeover, data theft, or malware distribution to visitors.

🟠

Likely Case

Session hijacking, credential theft, or unauthorized administrative actions through social engineering.

🟢

If Mitigated

Limited impact if administrators use script-blocking browsers or security plugins that detect XSS attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Reflected XSS vulnerabilities are commonly exploited via phishing links. No public exploit code is known, but the vulnerability details are public.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version after 1.3.0.5

Vendor Advisory: https://plugins.trac.wordpress.org/browser/powerpack-addon-for-beaver-builder/trunk/includes/admin-settings-templates.php#L62

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find PowerPack Lite for Beaver Builder. 4. Click 'Update Now' if available. 5. Alternatively, download the latest version from WordPress plugin repository and replace the plugin files.

🔧 Temporary Workarounds

Disable plugin

all

Temporarily deactivate the vulnerable plugin until patched.

wp plugin deactivate powerpack-addon-for-beaver-builder

Web Application Firewall rule

all

Block requests containing malicious scripts in the navigate parameter.

🧯 If You Can't Patch

  • Implement strict Content Security Policy (CSP) headers to mitigate script injection.
  • Use browser security extensions or plugins that block reflected XSS attempts.

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin > Plugins > Installed Plugins for PowerPack Lite version. If version is 1.3.0.5 or lower, it is vulnerable.

Check Version:

wp plugin get powerpack-addon-for-beaver-builder --field=version

Verify Fix Applied:

After update, verify plugin version is above 1.3.0.5. Test by attempting to inject a harmless script via navigate parameter (e.g., ?navigate=<script>alert('test')</script>) and confirm it doesn't execute.

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests with navigate parameter containing script tags or JavaScript code
  • Unusual admin activity following visits to crafted URLs

Network Indicators:

  • Outgoing requests to suspicious domains from admin sessions
  • Unexpected script loads in admin interface

SIEM Query:

source="web_logs" AND uri="*navigate=*script*"

🔗 References

📤 Share & Export