CVE-2024-39667
📋 TL;DR
This stored cross-site scripting (XSS) vulnerability in BdThemes Element Pack Elementor Addons allows attackers to inject malicious scripts into WordPress pages. When users view compromised pages, the scripts execute in their browsers, potentially stealing session cookies or performing actions on their behalf. All WordPress sites using vulnerable versions of this Elementor addon are affected.
💻 Affected Systems
- BdThemes Element Pack Elementor Addons
📦 What is this software?
Element Pack by Bdthemes
⚠️ Risk & Real-World Impact
Worst Case
Attackers could steal administrator session cookies, take over WordPress sites, deface content, install backdoors, or redirect visitors to malicious sites.
Likely Case
Attackers inject malicious JavaScript to steal user session cookies, potentially compromising user accounts and performing unauthorized actions.
If Mitigated
With proper input validation and output encoding, malicious scripts would be neutralized before reaching users' browsers.
🎯 Exploit Status
Stored XSS vulnerabilities are commonly exploited. Attackers need to inject malicious scripts through vulnerable input fields.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 5.6.12 or later
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'Element Pack Elementor Addons'. 4. Click 'Update Now' if update available. 5. Alternatively, download latest version from WordPress repository and manually update.
🔧 Temporary Workarounds
Temporary Plugin Deactivation
allDisable the vulnerable plugin until patched
Content Security Policy (CSP)
allImplement CSP headers to restrict script execution
Add to .htaccess: Header set Content-Security-Policy "script-src 'self'"
Add to wp-config.php: header("Content-Security-Policy: script-src 'self'");
🧯 If You Can't Patch
- Disable or remove the Element Pack Elementor Addons plugin
- Implement web application firewall (WAF) rules to block XSS payloads
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin > Plugins > Installed Plugins for 'Element Pack Elementor Addons' version 5.6.11 or earlier
Check Version:
wp plugin list --name='Element Pack Elementor Addons' --field=version
Verify Fix Applied:
Verify plugin version is 5.6.12 or later in WordPress admin panel
📡 Detection & Monitoring
Log Indicators:
- Unusual POST requests to WordPress admin-ajax.php or admin-post.php with script tags
- Multiple failed login attempts following suspicious content updates
Network Indicators:
- Outbound connections to unknown domains from WordPress site
- Unusual JavaScript payloads in HTTP requests
SIEM Query:
source="wordpress.log" AND ("<script>" OR "javascript:" OR "onload=" OR "onerror=")