CVE-2024-4156

6.4 MEDIUM

📋 TL;DR

This stored XSS vulnerability in the Essential Addons for Elementor WordPress plugin allows authenticated attackers with contributor-level permissions or higher to inject malicious scripts into website pages. The scripts execute whenever users visit the compromised pages, potentially leading to session hijacking, credential theft, or malware distribution. All WordPress sites using vulnerable plugin versions are affected.

💻 Affected Systems

Products:
  • Essential Addons for Elementor – Best Elementor Templates, Widgets, Kits & WooCommerce Builders
Versions: Up to and including 5.9.17
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress with the vulnerable plugin installed and at least one user with contributor-level permissions or higher.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator credentials, install backdoors, redirect users to malicious sites, or perform actions on behalf of authenticated users, potentially leading to complete site compromise.

🟠

Likely Case

Attackers with contributor access inject malicious scripts to steal user session cookies or credentials, perform phishing attacks, or deface website content.

🟢

If Mitigated

With proper input validation and output escaping, the vulnerability would be prevented, and only properly sanitized content would be displayed to users.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access with at least contributor permissions. The vulnerability is in a popular WordPress plugin, making it an attractive target.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.9.18 or later

Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3079406/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Essential Addons for Elementor'. 4. Click 'Update Now' if available. 5. Alternatively, download version 5.9.18+ from WordPress.org and manually update.

🔧 Temporary Workarounds

Remove Contributor Access

all

Temporarily remove contributor-level permissions from untrusted users until patching is complete.

Disable Event Calendar Element

all

Disable the vulnerable Event Calendar element if not in use.

🧯 If You Can't Patch

  • Implement strict user access controls and review all contributor-level accounts
  • Deploy a web application firewall (WAF) with XSS protection rules

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins for Essential Addons for Elementor version. If version is 5.9.17 or lower, you are vulnerable.

Check Version:

wp plugin list --name='essential-addons-for-elementor' --field=version

Verify Fix Applied:

After updating, verify the plugin version shows 5.9.18 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to admin-ajax.php with eael_event_text_color parameter containing script tags
  • Multiple failed login attempts followed by successful contributor-level login

Network Indicators:

  • Unexpected JavaScript payloads in HTTP requests to WordPress endpoints
  • Suspicious outbound connections from WordPress site after page visits

SIEM Query:

source="wordpress.log" AND ("eael_event_text_color" OR "Event_Calendar.php") AND ("<script>" OR "javascript:")

🔗 References

📤 Share & Export