CVE-2024-13699

6.4 MEDIUM

📋 TL;DR

The Qi Addons For Elementor WordPress plugin has a stored cross-site scripting vulnerability in the 'cursor' parameter that allows authenticated attackers with Contributor access or higher to inject malicious scripts. These scripts execute when users view compromised pages, potentially stealing credentials or performing unauthorized actions. All versions up to 1.8.7 are affected, with partial patches in 1.8.5-1.8.7 that didn't fully address the issue.

💻 Affected Systems

Products:
  • Qi Addons For Elementor WordPress plugin
Versions: All versions up to and including 1.8.7
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires plugin to be installed and active. Partial patches in versions 1.8.5, 1.8.6, and 1.8.7 didn't fully fix the vulnerability.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator credentials, take over websites, deface content, or redirect users to malicious sites, potentially leading to complete site compromise and data theft.

🟠

Likely Case

Attackers with contributor access inject malicious scripts to steal user session cookies, perform actions as authenticated users, or display phishing content to visitors.

🟢

If Mitigated

With proper input validation and output escaping, malicious scripts are neutralized, preventing execution while maintaining plugin functionality.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access (Contributor role or higher). The vulnerability is in a widely used plugin, making it an attractive target.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version after 1.8.7 (check for latest update)

Vendor Advisory: https://plugins.trac.wordpress.org/browser/qi-addons-for-elementor/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Qi Addons For Elementor'. 4. Click 'Update Now' if available. 5. If no update appears, manually download latest version from WordPress repository and replace plugin files.

🔧 Temporary Workarounds

Disable vulnerable shortcode

all

Temporarily disable the typeout-text shortcode functionality until patched

Edit wp-config.php and add: define('DISABLE_QI_TYPEOUT', true);

Restrict contributor permissions

all

Temporarily remove contributor ability to edit posts/pages

Use WordPress role editor plugin to modify contributor capabilities

🧯 If You Can't Patch

  • Disable the Qi Addons For Elementor plugin completely
  • Implement web application firewall (WAF) rules to block XSS payloads in cursor parameter

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Qi Addons For Elementor → Version. If version is 1.8.7 or lower, you're vulnerable.

Check Version:

wp plugin list --name='qi-addons-for-elementor' --field=version

Verify Fix Applied:

After updating, verify version is above 1.8.7. Test cursor parameter input with basic XSS payloads like <script>alert('test')</script> to ensure sanitization.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to admin-ajax.php with cursor parameter containing script tags
  • Multiple failed login attempts followed by successful contributor login

Network Indicators:

  • Outbound connections to suspicious domains from your WordPress site
  • Unexpected iframe or script injections in page responses

SIEM Query:

source="wordpress.log" AND "cursor=" AND ("<script>" OR "javascript:" OR "onerror=" OR "onload=")

🔗 References

📤 Share & Export