CVE-2024-32785

7.1 HIGH

📋 TL;DR

A Cross-Site Request Forgery (CSRF) vulnerability in The Pack Elementor addons WordPress plugin allows attackers to trick authenticated users into performing unintended actions, which can lead to Cross-Site Scripting (XSS) attacks. This affects WordPress sites using The Pack Elementor addons plugin versions up to 2.0.8.3. Attackers can inject malicious scripts that execute in victims' browsers when they visit compromised pages.

💻 Affected Systems

Products:
  • The Pack Elementor addons WordPress plugin
Versions: n/a through 2.0.8.3
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress with The Pack Elementor addons plugin installed and activated. The vulnerability is present in default configurations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could inject persistent XSS payloads that steal admin credentials, hijack user sessions, deface websites, or redirect users to malicious sites when any authenticated user visits a compromised page.

🟠

Likely Case

Attackers create malicious links or forms that trick logged-in users into unknowingly submitting requests that inject XSS payloads into vulnerable plugin settings, leading to session theft or credential harvesting.

🟢

If Mitigated

With proper CSRF protections and input validation, the vulnerability would be prevented, and XSS payloads would be sanitized before execution.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires tricking an authenticated user into clicking a malicious link or visiting a crafted page. CSRF-to-XSS chains are commonly weaponized in WordPress environments.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.0.8.4 or later

Vendor Advisory: https://patchstack.com/database/vulnerability/the-pack-addon/wordpress-the-pack-elementor-addons-plugin-2-0-8-3-cross-site-request-forgery-csrf-to-xss-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'The Pack Elementor addons' and check if update is available. 4. Click 'Update Now' to upgrade to version 2.0.8.4 or higher. 5. Verify the plugin version after update.

🔧 Temporary Workarounds

Temporarily Disable Plugin

all

Deactivate The Pack Elementor addons plugin until patched to prevent exploitation.

wp plugin deactivate the-pack-addon

Implement CSRF Protection Headers

all

Add Content Security Policy (CSP) headers to mitigate XSS and CSRF attacks at the web server level.

Add 'Content-Security-Policy: default-src 'self';' to web server configuration

🧯 If You Can't Patch

  • Restrict plugin access to trusted users only by implementing strong authentication and limiting admin privileges.
  • Monitor web application logs for suspicious POST requests to plugin endpoints and implement WAF rules to block CSRF attempts.

🔍 How to Verify

Check if Vulnerable:

Check the plugin version in WordPress admin under Plugins > Installed Plugins. If version is 2.0.8.3 or lower, the system is vulnerable.

Check Version:

wp plugin get the-pack-addon --field=version

Verify Fix Applied:

After updating, verify the plugin version shows 2.0.8.4 or higher in the WordPress plugins list.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /wp-admin/admin-ajax.php or plugin-specific endpoints from unexpected referrers
  • Multiple failed CSRF token validations in WordPress debug logs

Network Indicators:

  • HTTP requests with suspicious parameters in POST data targeting plugin functionality
  • Traffic patterns showing CSRF attacks with embedded JavaScript payloads

SIEM Query:

source="wordpress.log" AND ("admin-ajax.php" OR "the-pack") AND (POST AND NOT referer="*your-domain*")

🔗 References

📤 Share & Export