CVE-2024-24843

7.1 HIGH

📋 TL;DR

A Cross-Site Request Forgery (CSRF) vulnerability in PowerPack Pro for Elementor allows attackers to trick authenticated administrators into performing unintended actions. This could lead to plugin settings changes and potentially XSS attacks. WordPress sites using vulnerable versions of this Elementor add-on are affected.

💻 Affected Systems

Products:
  • PowerPack Pro for Elementor
Versions: All versions before 2.10.8
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress with Elementor and PowerPack Pro plugin installed. Administrator access needed for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could change plugin settings to inject malicious scripts, potentially compromising the entire WordPress site and stealing administrator credentials or user data.

🟠

Likely Case

Attackers could modify plugin configurations to enable XSS payloads, leading to session hijacking or defacement of the WordPress site.

🟢

If Mitigated

With proper CSRF protections and user awareness, exploitation attempts would fail, maintaining normal plugin functionality.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

CSRF attacks typically require social engineering to trick authenticated users. No authentication bypass needed beyond tricking an admin.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.10.8

Vendor Advisory: https://patchstack.com/database/vulnerability/powerpack-elements/wordpress-powerpack-pro-for-elementor-plugin-2-10-8-csrf-leading-to-plugin-settings-change-xss-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find PowerPack Pro for Elementor. 4. Click 'Update Now' if available. 5. Alternatively, download version 2.10.8+ from vendor and upload manually.

🔧 Temporary Workarounds

CSRF Protection Headers

all

Implement Content Security Policy headers to restrict script execution sources

Add to .htaccess: Header set Content-Security-Policy "default-src 'self'; script-src 'self' 'unsafe-inline' https://trusted.cdn.com;"
Add to wp-config.php: define('FORCE_SSL_ADMIN', true);

Plugin Deactivation

all

Temporarily disable PowerPack Pro for Elementor until patched

wp plugin deactivate powerpack-elements
Or via WordPress admin: Plugins → Installed Plugins → Deactivate under PowerPack Pro

🧯 If You Can't Patch

  • Implement strict CSRF tokens on all admin forms using WordPress nonces
  • Restrict admin panel access to specific IP addresses only

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins → PowerPack Pro for Elementor version number

Check Version:

wp plugin list --name=powerpack --field=version

Verify Fix Applied:

Confirm version is 2.10.8 or higher in WordPress plugins list

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /wp-admin/admin-ajax.php with powerpack actions
  • Multiple failed CSRF token validations in WordPress debug logs

Network Indicators:

  • Unexpected plugin setting changes without corresponding admin logins
  • External domains loading in admin panel requests

SIEM Query:

source="wordpress.log" AND ("powerpack" OR "pp_elements") AND ("admin-ajax" OR "wp-admin") AND status=200

🔗 References

📤 Share & Export