CVE-2024-37554

6.5 MEDIUM

📋 TL;DR

This CVE describes a cross-site scripting (XSS) vulnerability in the UltraAddons Elementor Lite WordPress plugin. Attackers can inject malicious scripts into web pages generated by the plugin, potentially compromising user sessions or stealing sensitive data. All WordPress sites using affected versions of this plugin are vulnerable.

💻 Affected Systems

Products:
  • UltraAddons Elementor Lite (Header & Footer Builder, Menu Builder, Cart Icon, Shortcode)
Versions: All versions through 1.1.6
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Affects WordPress installations with the vulnerable plugin enabled. No special configuration required.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator credentials, take over WordPress sites, install backdoors, or redirect visitors to malicious sites.

🟠

Likely Case

Attackers steal user session cookies, perform actions on behalf of authenticated users, or deface website content.

🟢

If Mitigated

With proper input validation and output encoding, malicious scripts would be neutralized before reaching users.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

XSS vulnerabilities typically have low exploitation complexity. The vulnerability is in the plugin's input handling during web page generation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.1.7 or later

Vendor Advisory: https://patchstack.com/database/vulnerability/ultraaddons-elementor-lite/wordpress-ultraaddons-elementor-addons-header-footer-builder-custom-font-custom-css-woo-widget-menu-builder-anywhere-elementor-shortcode-plugin-1-1-6-cross-site-scripting-xss-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find UltraAddons Elementor Lite. 4. Click 'Update Now' if update is available. 5. Alternatively, download version 1.1.7+ from WordPress repository and replace the plugin files.

🔧 Temporary Workarounds

Disable vulnerable plugin

all

Temporarily disable the UltraAddons Elementor Lite plugin until patched

wp plugin deactivate ultraaddons-elementor-lite

Implement WAF rules

all

Configure web application firewall to block XSS payloads targeting this plugin

🧯 If You Can't Patch

  • Implement Content Security Policy (CSP) headers to restrict script execution
  • Use WordPress security plugins with XSS protection features

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → UltraAddons Elementor Lite version. If version is 1.1.6 or earlier, you are vulnerable.

Check Version:

wp plugin get ultraaddons-elementor-lite --field=version

Verify Fix Applied:

After updating, verify plugin version shows 1.1.7 or later in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST/GET requests containing script tags or JavaScript payloads to plugin endpoints
  • Multiple failed XSS attempts in web server logs

Network Indicators:

  • HTTP requests containing malicious script payloads in parameters
  • Unexpected JavaScript execution from plugin-related resources

SIEM Query:

source="web_server_logs" AND (uri="*ultraaddons*" OR uri="*elementor*") AND (message="*<script>*" OR message="*javascript:*" OR message="*onload=*" OR message="*onerror=*")

🔗 References

📤 Share & Export