CVE-2024-45454

7.1 HIGH

📋 TL;DR

This CVE describes a reflected cross-site scripting (XSS) vulnerability in the Unlimited Elements for Elementor WordPress plugin. Attackers can inject malicious scripts via crafted URLs that execute when users visit compromised pages. WordPress sites using vulnerable versions of this plugin are affected.

💻 Affected Systems

Products:
  • Unlimited Elements For Elementor (Free Widgets, Addons, Templates)
Versions: from n/a through 1.5.121
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: All WordPress installations with vulnerable plugin versions are affected regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator session cookies, perform actions as authenticated users, deface websites, or redirect users to malicious sites.

🟠

Likely Case

Attackers craft phishing links containing malicious scripts that execute when users click them, potentially stealing session data or performing limited unauthorized actions.

🟢

If Mitigated

With proper input validation and output encoding, malicious scripts would be neutralized before execution, preventing successful exploitation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Reflected XSS typically requires user interaction (clicking malicious link) but doesn't require authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.5.122 or later

Vendor Advisory: https://patchstack.com/database/vulnerability/unlimited-elements-for-elementor/wordpress-unlimited-elements-for-elementor-plugin-1-5-121-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Unlimited Elements For Elementor'. 4. Click 'Update Now' if available. 5. Alternatively, download version 1.5.122+ from WordPress repository and manually update.

🔧 Temporary Workarounds

Disable vulnerable plugin

all

Temporarily disable the Unlimited Elements plugin until patched

wp plugin deactivate unlimited-elements-for-elementor

Implement WAF rules

all

Add web application firewall rules to block XSS payloads

🧯 If You Can't Patch

  • Implement Content Security Policy (CSP) headers to restrict script execution
  • Use browser security extensions or plugins that block XSS attacks

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Unlimited Elements For Elementor → check version number

Check Version:

wp plugin get unlimited-elements-for-elementor --field=version

Verify Fix Applied:

Verify plugin version is 1.5.122 or higher after update

📡 Detection & Monitoring

Log Indicators:

  • Unusual GET requests with script tags or JavaScript in URL parameters
  • Multiple 404 errors for crafted URLs

Network Indicators:

  • HTTP requests containing <script> tags or JavaScript in query strings
  • Unusual redirects from your domain

SIEM Query:

source="web_server" AND (url="*<script>*" OR url="*javascript:*" OR url="*onload=*" OR url="*onerror=*")

🔗 References

📤 Share & Export