CVE-2024-4866
📋 TL;DR
This vulnerability allows authenticated WordPress users with contributor-level access or higher to inject malicious scripts into website pages using the UltraAddons plugin. The stored XSS payload executes whenever users visit compromised pages, potentially affecting all visitors. The issue affects all versions up to 1.1.6 due to insufficient input sanitization in multiple widgets.
💻 Affected Systems
- UltraAddons – Elementor Addons (Header Footer Builder, Custom Font, Custom CSS, Woo Widget, Menu Builder, Anywhere Elementor Shortcode)
📦 What is this software?
Ultraaddons by Codeastrology
⚠️ Risk & Real-World Impact
Worst Case
Attackers could steal session cookies, redirect users to malicious sites, deface websites, or perform actions on behalf of authenticated users, potentially leading to full site compromise.
Likely Case
Attackers with contributor access inject malicious scripts that steal user session data or redirect visitors to phishing sites, compromising user accounts and site integrity.
If Mitigated
With proper user role management and content review processes, impact is limited to potential defacement of specific pages rather than widespread compromise.
🎯 Exploit Status
Exploitation requires authenticated access but is straightforward once attacker has contributor privileges. Multiple widget entry points increase attack surface.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.1.7 or later
Vendor Advisory: https://wordpress.org/plugins/ultraaddons-elementor-lite/#developers
Restart Required: No
Instructions:
1. Log into WordPress admin panel
2. Navigate to Plugins → Installed Plugins
3. Find UltraAddons – Elementor Addons
4. Click 'Update Now' if update available
5. If no update appears, manually download version 1.1.7+ from WordPress repository
6. Deactivate old plugin, upload new version via FTP or admin panel
7. Reactivate plugin
🔧 Temporary Workarounds
Temporary Plugin Deactivation
allDisable the vulnerable plugin until patched version is available
wp plugin deactivate ultraaddons-elementor-lite
User Role Restriction
allTemporarily restrict contributor-level users from editing content
Use WordPress role management plugins or custom code to modify capabilities
🧯 If You Can't Patch
- Remove contributor-level access for untrusted users
- Implement web application firewall with XSS protection rules
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin panel → Plugins → UltraAddons plugin version. If version is 1.1.6 or lower, system is vulnerable.
Check Version:
wp plugin get ultraaddons-elementor-lite --field=version
Verify Fix Applied:
Verify plugin version is 1.1.7 or higher in WordPress admin panel. Test widget functionality remains intact.
📡 Detection & Monitoring
Log Indicators:
- Unusual content modifications by contributor-level users
- Multiple widget updates in short timeframe
- POST requests to widget endpoints with script-like payloads
Network Indicators:
- Inbound requests containing script tags in widget parameters
- Outbound connections to suspicious domains from previously normal pages
SIEM Query:
source="wordpress" AND (event_type="plugin_update" AND plugin_name="ultraaddons*" AND version<="1.1.6") OR (event_type="content_edit" AND user_role="contributor" AND content CONTAINS "<script>")
🔗 References
- https://plugins.trac.wordpress.org/browser/ultraaddons-elementor-lite/trunk/inc/widget/advance-pricing-table.php#L1340
- https://plugins.trac.wordpress.org/browser/ultraaddons-elementor-lite/trunk/inc/widget/hero-slider.php#L919
- https://plugins.trac.wordpress.org/browser/ultraaddons-elementor-lite/trunk/inc/widget/hotspot.php#L341
- https://plugins.trac.wordpress.org/browser/ultraaddons-elementor-lite/trunk/inc/widget/video-popup.php#L592
- https://plugins.trac.wordpress.org/browser/ultraaddons-elementor-lite/trunk/inc/widget/work-hour.php#L529
- https://www.wordfence.com/threat-intel/vulnerabilities/id/544d7572-651f-45bb-b2ce-d768553c251a?source=cve
- https://plugins.trac.wordpress.org/browser/ultraaddons-elementor-lite/trunk/inc/widget/advance-pricing-table.php#L1340
- https://plugins.trac.wordpress.org/browser/ultraaddons-elementor-lite/trunk/inc/widget/hero-slider.php#L919
- https://plugins.trac.wordpress.org/browser/ultraaddons-elementor-lite/trunk/inc/widget/hotspot.php#L341
- https://plugins.trac.wordpress.org/browser/ultraaddons-elementor-lite/trunk/inc/widget/video-popup.php#L592
- https://plugins.trac.wordpress.org/browser/ultraaddons-elementor-lite/trunk/inc/widget/work-hour.php#L529
- https://www.wordfence.com/threat-intel/vulnerabilities/id/544d7572-651f-45bb-b2ce-d768553c251a?source=cve