CVE-2024-5332

6.4 MEDIUM

📋 TL;DR

This vulnerability allows authenticated WordPress users with contributor-level access or higher to inject malicious scripts into pages using the Exclusive Addons for Elementor plugin's Card widget. The scripts are stored and execute whenever users view the compromised pages, enabling cross-site scripting attacks. All WordPress sites using this plugin up to version 2.6.9.8 are affected.

💻 Affected Systems

Products:
  • Exclusive Addons for Elementor WordPress plugin
Versions: All versions up to and including 2.6.9.8
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress with Elementor page builder and the Exclusive Addons plugin installed. Contributor-level access or higher needed for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator credentials, redirect users to malicious sites, deface websites, or perform actions on behalf of authenticated users, potentially leading to complete site compromise.

🟠

Likely Case

Attackers with contributor access inject malicious scripts to steal user session cookies, redirect visitors to phishing sites, or display unwanted content on affected pages.

🟢

If Mitigated

With proper user access controls and content security policies, impact is limited to defacement or minor content manipulation on specific pages.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward once an attacker has contributor credentials. The vulnerability is in a popular WordPress plugin making it an attractive target.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.6.9.9 and later

Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3103786/exclusive-addons-for-elementor

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Exclusive Addons for Elementor'. 4. Click 'Update Now' if available, or manually update to version 2.6.9.9+. 5. Clear any caching plugins/CDN caches.

🔧 Temporary Workarounds

Disable Card Widget

all

Temporarily disable the vulnerable Card widget in the Exclusive Addons plugin settings

Restrict User Roles

all

Temporarily remove contributor-level editing permissions from untrusted users

🧯 If You Can't Patch

  • Implement strict Content Security Policy (CSP) headers to limit script execution
  • Use web application firewall rules to block suspicious script injection patterns

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Exclusive Addons for Elementor → Version number. If version is 2.6.9.8 or lower, you are vulnerable.

Check Version:

wp plugin list --name='exclusive-addons-for-elementor' --field=version

Verify Fix Applied:

After updating, verify the plugin version shows 2.6.9.9 or higher in WordPress admin plugins page.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /wp-admin/admin-ajax.php with Card widget parameters
  • Multiple failed login attempts followed by successful contributor-level login

Network Indicators:

  • Unexpected script tags in page responses containing 'exad-card' class or widget references

SIEM Query:

source="wordpress.log" AND ("exad-card" OR "exclusive-addons") AND ("script" OR "onclick" OR "javascript:")

🔗 References

📤 Share & Export