CVE-2024-32785
📋 TL;DR
A Cross-Site Request Forgery (CSRF) vulnerability in The Pack Elementor addons WordPress plugin allows attackers to trick authenticated users into performing unintended actions, which can lead to Cross-Site Scripting (XSS) attacks. This affects WordPress sites using The Pack Elementor addons plugin versions up to 2.0.8.3. Attackers can inject malicious scripts that execute in victims' browsers when they visit compromised pages.
💻 Affected Systems
- The Pack Elementor addons WordPress plugin
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Attackers could inject persistent XSS payloads that steal admin credentials, hijack user sessions, deface websites, or redirect users to malicious sites when any authenticated user visits a compromised page.
Likely Case
Attackers create malicious links or forms that trick logged-in users into unknowingly submitting requests that inject XSS payloads into vulnerable plugin settings, leading to session theft or credential harvesting.
If Mitigated
With proper CSRF protections and input validation, the vulnerability would be prevented, and XSS payloads would be sanitized before execution.
🎯 Exploit Status
Exploitation requires tricking an authenticated user into clicking a malicious link or visiting a crafted page. CSRF-to-XSS chains are commonly weaponized in WordPress environments.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 2.0.8.4 or later
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'The Pack Elementor addons' and check if update is available. 4. Click 'Update Now' to upgrade to version 2.0.8.4 or higher. 5. Verify the plugin version after update.
🔧 Temporary Workarounds
Temporarily Disable Plugin
allDeactivate The Pack Elementor addons plugin until patched to prevent exploitation.
wp plugin deactivate the-pack-addon
Implement CSRF Protection Headers
allAdd Content Security Policy (CSP) headers to mitigate XSS and CSRF attacks at the web server level.
Add 'Content-Security-Policy: default-src 'self';' to web server configuration
🧯 If You Can't Patch
- Restrict plugin access to trusted users only by implementing strong authentication and limiting admin privileges.
- Monitor web application logs for suspicious POST requests to plugin endpoints and implement WAF rules to block CSRF attempts.
🔍 How to Verify
Check if Vulnerable:
Check the plugin version in WordPress admin under Plugins > Installed Plugins. If version is 2.0.8.3 or lower, the system is vulnerable.
Check Version:
wp plugin get the-pack-addon --field=version
Verify Fix Applied:
After updating, verify the plugin version shows 2.0.8.4 or higher in the WordPress plugins list.
📡 Detection & Monitoring
Log Indicators:
- Unusual POST requests to /wp-admin/admin-ajax.php or plugin-specific endpoints from unexpected referrers
- Multiple failed CSRF token validations in WordPress debug logs
Network Indicators:
- HTTP requests with suspicious parameters in POST data targeting plugin functionality
- Traffic patterns showing CSRF attacks with embedded JavaScript payloads
SIEM Query:
source="wordpress.log" AND ("admin-ajax.php" OR "the-pack") AND (POST AND NOT referer="*your-domain*")
🔗 References
- https://patchstack.com/database/vulnerability/the-pack-addon/wordpress-the-pack-elementor-addons-plugin-2-0-8-3-cross-site-request-forgery-csrf-to-xss-vulnerability?_s_id=cve
- https://patchstack.com/database/vulnerability/the-pack-addon/wordpress-the-pack-elementor-addons-plugin-2-0-8-3-cross-site-request-forgery-csrf-to-xss-vulnerability?_s_id=cve