CVE-2024-5327

6.4 MEDIUM

📋 TL;DR

This vulnerability allows authenticated WordPress users with Contributor-level access or higher to inject malicious JavaScript into pages using the PowerPack Addons for Elementor plugin. The injected scripts execute whenever other users view the compromised pages, enabling session hijacking, defacement, or credential theft. All WordPress sites using PowerPack Addons for Elementor versions up to 2.7.19 are affected.

💻 Affected Systems

Products:
  • PowerPack Addons for Elementor (Free Widgets, Extensions and Templates)
Versions: All versions up to and including 2.7.19
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress with PowerPack Addons for Elementor plugin installed. Vulnerability is present in default configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator credentials, take over the WordPress site, install backdoors, or redirect visitors to malicious sites, potentially leading to complete site compromise and data breaches.

🟠

Likely Case

Attackers with contributor access inject malicious scripts to steal user sessions, deface pages, or redirect users to phishing sites, causing reputation damage and potential credential theft.

🟢

If Mitigated

With proper user access controls and content security policies, impact is limited to defacement of specific pages without broader site compromise.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access (Contributor role or higher). The vulnerability is well-documented with public proof-of-concept available in the references.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.7.20 or later

Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3094253/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'PowerPack Addons for Elementor'. 4. Click 'Update Now' if update is available. 5. Alternatively, download version 2.7.20+ from WordPress plugin repository and manually update.

🔧 Temporary Workarounds

Temporary Plugin Deactivation

all

Deactivate the PowerPack Addons for Elementor plugin until patched

wp plugin deactivate powerpack-lite-for-elementor

Restrict User Roles

all

Temporarily remove Contributor and Author roles or restrict their capabilities

Use WordPress role management plugins or functions.php modifications

🧯 If You Can't Patch

  • Implement Content Security Policy (CSP) headers to restrict script execution
  • Regularly audit user accounts and remove unnecessary Contributor/Author roles

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins → PowerPack Addons for Elementor version. If version is 2.7.19 or lower, you are vulnerable.

Check Version:

wp plugin get powerpack-lite-for-elementor --field=version

Verify Fix Applied:

Verify plugin version is 2.7.20 or higher in WordPress admin panel. Check that the 'pp_animated_gradient_bg_color' parameter is properly sanitized in the code.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to pages with 'pp_animated_gradient_bg_color' parameter
  • Multiple failed login attempts followed by successful Contributor-level login
  • Unexpected JavaScript injection in page content

Network Indicators:

  • Suspicious outbound connections from WordPress site after page views
  • Unexpected redirects from legitimate pages

SIEM Query:

source="wordpress" AND (uri="*pp_animated_gradient_bg_color*" OR message="*XSS*" OR message="*script injection*")

🔗 References

📤 Share & Export