CVE-2024-51662

6.5 MEDIUM

📋 TL;DR

This stored XSS vulnerability in the Black Widgets For Elementor WordPress plugin allows attackers to inject malicious scripts into web pages. When users view affected pages, the scripts execute in their browsers, potentially stealing credentials or performing unauthorized actions. All WordPress sites using vulnerable versions of this plugin are affected.

💻 Affected Systems

Products:
  • Black Widgets For Elementor WordPress Plugin
Versions: All versions up to and including 1.3.6
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress with Elementor page builder installed. The vulnerability is in the plugin's widget rendering code.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator session cookies, take over WordPress sites, deface websites, or redirect visitors to malicious sites, leading to complete site compromise and data theft.

🟠

Likely Case

Attackers inject malicious JavaScript to steal user session cookies or credentials, potentially gaining administrative access to the WordPress site.

🟢

If Mitigated

With proper input validation and output escaping, malicious scripts would be neutralized before reaching users' browsers.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

XSS vulnerabilities are commonly exploited. While no public PoC is confirmed, similar XSS flaws in WordPress plugins are frequently weaponized.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.3.7 or later

Vendor Advisory: https://patchstack.com/database/vulnerability/black-widgets/wordpress-black-widgets-for-elementor-plugin-1-3-6-cross-site-scripting-xss-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Go to Plugins → Installed Plugins. 3. Find 'Black Widgets For Elementor'. 4. Click 'Update Now' if available. 5. If no update appears, manually download version 1.3.7+ from WordPress.org and replace plugin files.

🔧 Temporary Workarounds

Disable vulnerable plugin

all

Temporarily deactivate the Black Widgets For Elementor plugin until patched

wp plugin deactivate black-widgets

Implement WAF rules

all

Add XSS protection rules to web application firewall

🧯 If You Can't Patch

  • Remove or disable the Black Widgets For Elementor plugin entirely
  • Implement strict Content Security Policy (CSP) headers to limit script execution

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins for 'Black Widgets For Elementor' version. If version is 1.3.6 or lower, you are vulnerable.

Check Version:

wp plugin get black-widgets --field=version

Verify Fix Applied:

After updating, verify plugin version shows 1.3.7 or higher in WordPress plugins list.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to WordPress admin-ajax.php with script tags
  • Suspicious content in post/page updates containing JavaScript

Network Indicators:

  • Injected script tags in HTTP responses
  • External JavaScript loading from unexpected domains

SIEM Query:

source="wordpress.log" AND ("black-widgets" OR "admin-ajax") AND ("script" OR "javascript" OR "onclick")

🔗 References

📤 Share & Export