CVE-2024-2082

7.2 HIGH

📋 TL;DR

This vulnerability allows unauthenticated attackers to inject malicious scripts into WordPress pages using the EleForms plugin. The scripts execute whenever users view compromised pages, potentially affecting all visitors to vulnerable WordPress sites. All WordPress installations using EleForms plugin versions up to 2.9.9.7 are affected.

💻 Affected Systems

Products:
  • EleForms – All In One Form Integration including DB for Elementor WordPress plugin
Versions: All versions up to and including 2.9.9.7
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all WordPress installations using the vulnerable plugin version, regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal session cookies, redirect users to malicious sites, deface websites, or perform actions on behalf of authenticated users, potentially leading to complete site compromise.

🟠

Likely Case

Attackers inject malicious scripts to steal user credentials, session tokens, or redirect users to phishing sites, compromising user accounts and data.

🟢

If Mitigated

With proper web application firewalls and input validation, malicious payloads would be blocked, preventing successful exploitation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Stored XSS vulnerabilities are commonly exploited, and this requires no authentication, making exploitation straightforward.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.9.9.8 or later

Vendor Advisory: https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3056456%40all-contact-form-integration-for-elementor%2Ftrunk&old=3021680%40all-contact-form-integration-for-elementor%2Ftrunk&sfp_email=&sfph_mail=

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find EleForms plugin and click 'Update Now'. 4. Verify plugin version is 2.9.9.8 or higher.

🔧 Temporary Workarounds

Temporarily disable plugin

all

Deactivate the EleForms plugin until patched to prevent exploitation.

wp plugin deactivate all-contact-form-integration-for-elementor

Enable WAF protection

all

Configure web application firewall to block XSS payloads in form parameters.

🧯 If You Can't Patch

  • Disable the EleForms plugin immediately
  • Implement strict Content Security Policy headers to mitigate XSS impact

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel → Plugins → Installed Plugins for EleForms version. If version is 2.9.9.7 or lower, you are vulnerable.

Check Version:

wp plugin get all-contact-form-integration-for-elementor --field=version

Verify Fix Applied:

After updating, confirm plugin version shows 2.9.9.8 or higher in WordPress admin.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to form submission endpoints with script tags in parameters
  • Multiple failed XSS attempts in web server logs

Network Indicators:

  • HTTP requests containing <script> tags in form parameters
  • Unusual outbound connections from compromised user browsers

SIEM Query:

source="web_logs" AND ("<script>" OR "javascript:") AND uri_path="/wp-admin/admin-ajax.php" AND plugin="eleforms"

🔗 References

📤 Share & Export