CVE-2024-54316

6.5 MEDIUM

📋 TL;DR

This DOM-based cross-site scripting (XSS) vulnerability in the NicheAddons Restaurant & Cafe Addon for Elementor WordPress plugin allows attackers to inject malicious scripts into web pages viewed by users. The vulnerability affects all WordPress sites using this plugin version 1.5.8 or earlier. Attackers can execute arbitrary JavaScript in victims' browsers when they visit compromised pages.

💻 Affected Systems

Products:
  • NicheAddons Restaurant & Cafe Addon for Elementor
Versions: 1.5.8 and earlier
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Affects WordPress installations with the vulnerable plugin activated. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal session cookies, perform actions as authenticated users, redirect to malicious sites, or install malware on visitors' systems.

🟠

Likely Case

Attackers inject malicious scripts to steal user session tokens or credentials, potentially compromising user accounts and website integrity.

🟢

If Mitigated

With proper input validation and output encoding, malicious scripts would be neutralized before reaching users' browsers.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

DOM-based XSS typically requires user interaction (visiting a malicious page) but doesn't require authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.5.9 or later

Vendor Advisory: https://patchstack.com/database/wordpress/plugin/restaurant-cafe-addon-for-elementor/vulnerability/wordpress-restaurant-cafe-addon-for-elementor-plugin-1-5-8-cross-site-scripting-xss-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Restaurant & Cafe Addon for Elementor'. 4. Click 'Update Now' if update available. 5. Alternatively, download latest version from WordPress repository and replace plugin files.

🔧 Temporary Workarounds

Disable vulnerable plugin

all

Temporarily deactivate the Restaurant & Cafe Addon for Elementor plugin until patched

wp plugin deactivate restaurant-cafe-addon-for-elementor

Implement Content Security Policy

all

Add CSP headers to restrict script execution sources

Add to .htaccess: Header set Content-Security-Policy "default-src 'self'; script-src 'self'"
Or add to wp-config.php: header("Content-Security-Policy: default-src 'self'; script-src 'self'");

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block XSS payloads
  • Disable the Restaurant & Cafe Addon for Elementor plugin entirely

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins for 'Restaurant & Cafe Addon for Elementor' version. If version is 1.5.8 or earlier, you are vulnerable.

Check Version:

wp plugin get restaurant-cafe-addon-for-elementor --field=version

Verify Fix Applied:

After updating, verify plugin version shows 1.5.9 or later in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST/GET requests with script tags or JavaScript payloads to pages using the plugin
  • Multiple failed login attempts following suspicious page visits

Network Indicators:

  • HTTP requests containing suspicious script tags or JavaScript in parameters
  • Unexpected outbound connections from user browsers after visiting site pages

SIEM Query:

source="web_server_logs" AND (uri="*restaurant-cafe*" OR uri="*elementor*") AND (message="*<script>*" OR message="*javascript:*" OR message="*onload=*" OR message="*onerror=*")

🔗 References

📤 Share & Export