CVE-2024-3675

6.4 MEDIUM

📋 TL;DR

This stored XSS vulnerability in the Royal Elementor Addons WordPress plugin allows authenticated attackers with contributor-level access or higher to inject malicious scripts into web pages. The scripts execute when users visit compromised pages, potentially stealing session cookies or redirecting to malicious sites. All WordPress sites using vulnerable plugin versions are affected.

💻 Affected Systems

Products:
  • Royal Elementor Addons and Templates WordPress plugin
Versions: All versions up to and including 1.3.971
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires contributor-level or higher authenticated access to exploit.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator credentials, deface websites, redirect visitors to malicious sites, or install backdoors for persistent access.

🟠

Likely Case

Session hijacking, credential theft, or website defacement by exploiting contributor accounts.

🟢

If Mitigated

Limited impact if proper user access controls and input validation are in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward once access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.3.972 or later

Vendor Advisory: https://wordpress.org/plugins/royal-elementor-addons/#developers

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find Royal Elementor Addons. 4. Click 'Update Now' if available. 5. Alternatively, download latest version from WordPress repository and manually update.

🔧 Temporary Workarounds

Disable vulnerable widgets

all

Temporarily disable Flip Carousel, Flip Box, Post Grid, and Taxonomy List widgets in plugin settings.

Restrict user roles

all

Limit contributor-level access to trusted users only and implement strong authentication.

🧯 If You Can't Patch

  • Implement strict Content Security Policy (CSP) headers to mitigate XSS impact
  • Use web application firewall (WAF) rules to block XSS payloads in widget parameters

🔍 How to Verify

Check if Vulnerable:

Check plugin version in WordPress admin panel under Plugins > Installed Plugins. If version is 1.3.971 or lower, you are vulnerable.

Check Version:

wp plugin list --name=royal-elementor-addons --field=version

Verify Fix Applied:

Verify plugin version is 1.3.972 or higher after update. Test widget functionality to ensure no regression.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to widget update endpoints
  • Suspicious JavaScript in page content

Network Indicators:

  • Malicious script payloads in HTTP requests to widget parameters

SIEM Query:

source="wordpress.log" AND ("wpr-flip-box" OR "wpr-flip-carousel" OR "wpr-grid" OR "wpr-taxonomy-list") AND ("<script>" OR "javascript:" OR "onerror=" OR "onload=")

🔗 References

📤 Share & Export