CVE-2024-29792
📋 TL;DR
This vulnerability allows attackers to inject malicious scripts into web pages generated by the Unlimited Elements For Elementor WordPress plugin. When users visit a specially crafted URL, the scripts execute in their browsers, potentially stealing session cookies or redirecting to malicious sites. All WordPress sites using vulnerable versions of this plugin are affected.
💻 Affected Systems
- Unlimited Elements For Elementor (Free Widgets, Addons, Templates)
📦 What is this software?
Unlimited Elements For Elementor by Unlimited Elements
⚠️ Risk & Real-World Impact
Worst Case
Attackers could steal administrator session cookies, take over WordPress sites, install backdoors, or redirect visitors to phishing/malware sites.
Likely Case
Attackers steal user session cookies, perform actions as logged-in users, or deface websites through injected content.
If Mitigated
With proper input validation and output encoding, malicious scripts are neutralized before reaching user browsers.
🎯 Exploit Status
Reflected XSS typically requires user interaction (clicking malicious link) but is easy to exploit via phishing.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.5.94 or later
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Go to Plugins → Installed Plugins. 3. Find 'Unlimited Elements For Elementor'. 4. Click 'Update Now' if available. 5. Alternatively, download version 1.5.94+ from WordPress.org and manually update.
🔧 Temporary Workarounds
Disable vulnerable plugin
allTemporarily disable the Unlimited Elements For Elementor plugin until patched
wp plugin deactivate unlimited-elements-for-elementor
Implement WAF rules
allConfigure web application firewall to block XSS payloads targeting the vulnerable endpoint
🧯 If You Can't Patch
- Implement Content Security Policy (CSP) headers to restrict script execution
- Use browser security extensions or plugins that block XSS attacks
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin → Plugins → Unlimited Elements For Elementor → Version. If version is 1.5.93 or lower, you are vulnerable.
Check Version:
wp plugin get unlimited-elements-for-elementor --field=version
Verify Fix Applied:
After updating, verify plugin version is 1.5.94 or higher in WordPress admin panel.
📡 Detection & Monitoring
Log Indicators:
- Unusual GET/POST requests containing script tags or JavaScript code to plugin endpoints
- Multiple failed XSS attempts in web server logs
Network Indicators:
- HTTP requests with suspicious parameters containing <script>, javascript:, or encoded payloads
SIEM Query:
source="web_logs" AND ("unlimited-elements" OR "elementor") AND ("<script>" OR "javascript:" OR "%3Cscript%3E")
🔗 References
- https://patchstack.com/database/vulnerability/unlimited-elements-for-elementor/wordpress-unlimited-elements-for-elementor-plugin-1-5-93-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve
- https://patchstack.com/database/vulnerability/unlimited-elements-for-elementor/wordpress-unlimited-elements-for-elementor-plugin-1-5-93-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve