CVE-2024-3728
📋 TL;DR
This vulnerability allows authenticated WordPress users with contributor-level access or higher to inject malicious scripts into web pages using the Essential Addons for Elementor plugin's Filterable Gallery and Interactive Circle widgets. The scripts execute whenever users visit compromised pages, enabling attackers to steal session cookies, redirect users, or perform other malicious actions. All WordPress sites using vulnerable versions of this plugin are affected.
💻 Affected Systems
- Essential Addons for Elementor – Best Elementor Templates, Widgets, Kits & WooCommerce Builders
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Attackers could steal administrator credentials, redirect users to malicious sites, deface websites, or install backdoors for persistent access.
Likely Case
Malicious contributors or compromised accounts inject tracking scripts, adware, or credential-stealing scripts into website pages.
If Mitigated
With proper user access controls and content review processes, only trusted users can create/modify content, limiting exploitation risk.
🎯 Exploit Status
Exploitation requires contributor-level WordPress access. Attack vectors include compromised accounts or malicious insiders.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 5.9.16
Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3075644/essential-addons-for-elementor-lite/tags/5.9.16/
Restart Required: No
Instructions:
1. Log into WordPress admin panel
2. Navigate to Plugins → Installed Plugins
3. Find 'Essential Addons for Elementor'
4. Click 'Update Now' if available
5. If not, download version 5.9.16+ from WordPress repository
6. Deactivate old version
7. Upload and activate new version
🔧 Temporary Workarounds
Disable vulnerable widgets
allTemporarily disable Filterable Gallery and Interactive Circle widgets in plugin settings
Restrict user roles
allLimit contributor-level access to trusted users only
🧯 If You Can't Patch
- Implement strict user access controls and review all content from contributor-level users
- Use web application firewall (WAF) rules to block XSS payloads targeting these widgets
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin → Plugins → Installed Plugins → Essential Addons for Elementor version. If version is 5.9.15 or lower, you are vulnerable.
Check Version:
wp plugin list --name='essential-addons-for-elementor' --field=version
Verify Fix Applied:
After updating, verify version shows 5.9.16 or higher in WordPress plugins list.
📡 Detection & Monitoring
Log Indicators:
- Unusual content modifications by contributor-level users
- Suspicious script tags in page content containing 'eael-filterable-gallery' or 'eael-interactive-circle'
Network Indicators:
- Unexpected JavaScript execution from page elements using vulnerable widget classes
SIEM Query:
source="wordpress.log" AND ("eael-filterable-gallery" OR "eael-interactive-circle") AND ("script" OR "onclick" OR "javascript:")
🔗 References
- https://plugins.trac.wordpress.org/changeset/3075644/essential-addons-for-elementor-lite/tags/5.9.16/includes/Elements/Filterable_Gallery.php
- https://plugins.trac.wordpress.org/changeset/3075644/essential-addons-for-elementor-lite/tags/5.9.16/includes/Elements/Interactive_Circle.php
- https://www.wordfence.com/threat-intel/vulnerabilities/id/284ea577-ff67-4681-995b-f7bb5ef0ff3e?source=cve
- https://plugins.trac.wordpress.org/changeset/3075644/essential-addons-for-elementor-lite/tags/5.9.16/includes/Elements/Filterable_Gallery.php
- https://plugins.trac.wordpress.org/changeset/3075644/essential-addons-for-elementor-lite/tags/5.9.16/includes/Elements/Interactive_Circle.php
- https://www.wordfence.com/threat-intel/vulnerabilities/id/284ea577-ff67-4681-995b-f7bb5ef0ff3e?source=cve