CVE-2024-13547

6.4 MEDIUM

📋 TL;DR

This vulnerability allows authenticated WordPress users with Contributor-level access or higher to inject malicious scripts into pages using the Image Accordion widget. The scripts execute whenever users view the compromised pages, enabling session hijacking, defacement, or malware distribution. All WordPress sites using the aThemes Addons for Elementor plugin up to version 1.0.12 are affected.

💻 Affected Systems

Products:
  • aThemes Addons for Elementor (WordPress plugin)
Versions: All versions up to and including 1.0.12
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress with Elementor page builder and the vulnerable plugin installed. Contributor-level access or higher needed for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator credentials, install backdoors, redirect users to malicious sites, or completely compromise the WordPress installation.

🟠

Likely Case

Attackers inject malicious JavaScript to steal user sessions, display fraudulent content, or redirect users to phishing pages.

🟢

If Mitigated

With proper user role management and content review processes, impact is limited to defacement of specific pages.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward once authenticated. Public proof-of-concept exists in vulnerability reports.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.0.13

Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3230740/athemes-addons-for-elementor-lite/trunk/inc/modules/widgets/image-accordion/class-image-accordion.php

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'aThemes Addons for Elementor'. 4. Click 'Update Now' if available, or download version 1.0.13+ from WordPress repository. 5. Activate the updated plugin.

🔧 Temporary Workarounds

Disable Image Accordion Widget

all

Temporarily disable the vulnerable widget until patching is complete

Navigate to Elementor > Settings > Advanced > Disable Image Accordion widget

Restrict Contributor Permissions

all

Temporarily restrict Contributor users from editing pages/posts

Use WordPress role management plugin to modify Contributor capabilities

🧯 If You Can't Patch

  • Remove Contributor role access entirely or restrict to trusted users only
  • Implement Content Security Policy (CSP) headers to mitigate XSS impact

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Installed Plugins for aThemes Addons for Elementor version 1.0.12 or lower

Check Version:

wp plugin list --name='aThemes Addons for Elementor' --field=version

Verify Fix Applied:

Verify plugin version is 1.0.13 or higher in WordPress admin panel

📡 Detection & Monitoring

Log Indicators:

  • Unusual page edits by Contributor users
  • JavaScript injection in page content
  • Multiple failed login attempts followed by successful Contributor login

Network Indicators:

  • Unexpected external script loads from WordPress pages
  • Suspicious redirects from legitimate pages

SIEM Query:

source="wordpress" AND (event="page_edit" AND user_role="contributor") OR (http_user_agent CONTAINS "<script>")

🔗 References

📤 Share & Export