CVE-2024-37428

6.5 MEDIUM

📋 TL;DR

This vulnerability allows attackers to inject malicious scripts into web pages generated by the WidgetKit plugin for WordPress, which are then executed when other users view those pages. It affects all WordPress sites using WidgetKit versions up to 2.5.0. This is a stored XSS vulnerability that persists across sessions.

💻 Affected Systems

Products:
  • Themesgrove WidgetKit (All-in-One Addons for Elementor)
Versions: All versions up to and including 2.5.0
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress with WidgetKit plugin installed and active. The vulnerability exists in the plugin's input handling during web page generation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal session cookies, redirect users to malicious sites, deface websites, or perform actions on behalf of authenticated users including administrators.

🟠

Likely Case

Attackers inject malicious scripts to steal user session cookies or credentials, potentially leading to account compromise and unauthorized access.

🟢

If Mitigated

With proper input validation and output encoding, malicious scripts would be neutralized before reaching users, preventing execution.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

XSS vulnerabilities are commonly exploited, though specific exploit details for this CVE aren't publicly documented. Attackers typically need some level of access to inject malicious content.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 2.5.0

Vendor Advisory: https://patchstack.com/database/vulnerability/widgetkit-for-elementor/wordpress-all-in-one-addons-for-elementor-widgetkit-plugin-2-5-0-cross-site-scripting-xss-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'WidgetKit - All-in-One Addons for Elementor'. 4. Click 'Update Now' if available, or manually update to latest version. 5. Verify plugin version is above 2.5.0.

🔧 Temporary Workarounds

Disable WidgetKit Plugin

all

Temporarily disable the vulnerable plugin until patched

wp plugin deactivate widgetkit-for-elementor

Implement WAF Rules

all

Add web application firewall rules to block XSS payloads

🧯 If You Can't Patch

  • Implement Content Security Policy (CSP) headers to restrict script execution
  • Enable input validation and output encoding at application level

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel → Plugins → WidgetKit version. If version is 2.5.0 or lower, you are vulnerable.

Check Version:

wp plugin get widgetkit-for-elementor --field=version

Verify Fix Applied:

Verify plugin version is above 2.5.0 in WordPress admin panel and test widget functionality.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to widget endpoints
  • Script tags in user-generated content fields
  • Multiple failed XSS attempts in web server logs

Network Indicators:

  • HTTP requests containing script injection patterns
  • Unusual outbound connections from user browsers after visiting widget pages

SIEM Query:

source="web_server" AND ("<script" OR "javascript:" OR "onerror=" OR "onload=") AND uri="*widgetkit*"

🔗 References

📤 Share & Export