CVE-2024-4983

6.4 MEDIUM

📋 TL;DR

This vulnerability allows authenticated WordPress users with Contributor-level access or higher to inject malicious scripts into web pages using the The Plus Addons for Elementor plugin. When other users visit pages containing these injected scripts, the scripts execute in their browsers, potentially stealing session cookies or performing unauthorized actions. All WordPress sites using vulnerable versions of this plugin are affected.

💻 Affected Systems

Products:
  • The Plus Addons for Elementor – Elementor Addons, Page Templates, Widgets, Mega Menu, WooCommerce
Versions: All versions up to and including 5.6.0
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress with the vulnerable plugin installed. Contributor-level access or higher is needed to exploit.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator session cookies, take over WordPress sites, deface websites, redirect users to malicious sites, or deploy malware to visitors' browsers.

🟠

Likely Case

Attackers with contributor accounts inject malicious scripts that steal user session data or perform unauthorized actions on behalf of users visiting compromised pages.

🟢

If Mitigated

With proper input validation and output escaping, malicious scripts would be neutralized before reaching users' browsers, preventing execution.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is technically simple once an attacker has contributor-level credentials.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.6.1 or later

Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3107776/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'The Plus Addons for Elementor'. 4. Click 'Update Now' if available. 5. Alternatively, download version 5.6.1+ from WordPress.org and manually update.

🔧 Temporary Workarounds

Temporarily disable vulnerable widget

all

Disable the TP Video Player widget in Elementor settings to prevent exploitation via the vulnerable parameter.

Restrict user roles

all

Temporarily remove Contributor-level access for untrusted users until patching is complete.

🧯 If You Can't Patch

  • Implement Content Security Policy (CSP) headers to restrict script execution sources
  • Use web application firewall (WAF) rules to block XSS payloads targeting the video_color parameter

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins for 'The Plus Addons for Elementor' version. If version is 5.6.0 or lower, you are vulnerable.

Check Version:

wp plugin list --name='the-plus-addons-for-elementor' --field=version

Verify Fix Applied:

After updating, verify the plugin version shows 5.6.1 or higher in WordPress admin plugins list.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to wp-admin containing video_color parameter with script tags
  • Multiple failed login attempts followed by successful contributor-level login

Network Indicators:

  • HTTP requests with suspicious payloads in video_color parameter
  • Outbound connections to unknown domains from your WordPress site

SIEM Query:

source="wordpress.log" AND ("video_color" AND ("<script>" OR "javascript:" OR "onerror="))

🔗 References

📤 Share & Export