CVE-2024-3489

6.4 MEDIUM

📋 TL;DR

This vulnerability allows unauthenticated attackers to perform reflected cross-site scripting attacks via the Countdown Expired Title parameter in the Exclusive Addons for Elementor WordPress plugin. Attackers can inject malicious scripts that execute when users click specially crafted links, potentially stealing session cookies or redirecting to malicious sites. All WordPress sites using this plugin up to version 2.6.9.4 are affected.

💻 Affected Systems

Products:
  • Exclusive Addons for Elementor WordPress Plugin
Versions: All versions up to and including 2.6.9.4
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress with Elementor plugin installed. Vulnerability exists in countdown timer element.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers steal administrator session cookies, gain administrative access to WordPress, install backdoors, deface websites, or steal sensitive user data.

🟠

Likely Case

Attackers steal user session cookies, perform account takeovers, redirect users to phishing sites, or display malicious content.

🟢

If Mitigated

With proper Content Security Policy headers and modern browser XSS protections, script execution may be blocked, limiting impact to failed attack attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Reflected XSS vulnerabilities are commonly weaponized. Attack requires social engineering to trick users into clicking malicious links.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.6.9.5 and later

Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3074085/exclusive-addons-for-elementor/trunk/elements/countdown-timer/countdown-timer.php

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Exclusive Addons for Elementor'. 4. Click 'Update Now' if available. 5. Alternatively, download latest version from WordPress repository and manually update.

🔧 Temporary Workarounds

Disable Countdown Timer Element

all

Temporarily disable the vulnerable countdown timer element until patching is possible.

Navigate to WordPress admin → Elementor → Exclusive Addons → Elements → Disable 'Countdown Timer'

Implement Content Security Policy

all

Add CSP headers to restrict script execution sources and mitigate XSS impact.

Add to .htaccess: Header set Content-Security-Policy "default-src 'self'; script-src 'self'"
Or configure via web server settings

🧯 If You Can't Patch

  • Implement Web Application Firewall (WAF) rules to block XSS payloads in URL parameters
  • Disable the Exclusive Addons plugin entirely until patching is possible

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Exclusive Addons for Elementor → Version number. If version is 2.6.9.4 or lower, you are vulnerable.

Check Version:

wp plugin list --name='exclusive-addons-for-elementor' --field=version

Verify Fix Applied:

After updating, verify version is 2.6.9.5 or higher. Test countdown timer functionality works without errors.

📡 Detection & Monitoring

Log Indicators:

  • Unusual GET requests with script tags in 'expired_title' parameter
  • Multiple failed XSS attempts in web server logs
  • Suspicious referrer URLs containing script payloads

Network Indicators:

  • HTTP requests with JavaScript in URL parameters
  • Unusual traffic patterns to countdown timer endpoints

SIEM Query:

source="web_logs" AND (uri="*expired_title*" AND (uri="*<script*" OR uri="*javascript:*" OR uri="*onload=*"))

🔗 References

📤 Share & Export