CVE-2024-54316
📋 TL;DR
This DOM-based cross-site scripting (XSS) vulnerability in the NicheAddons Restaurant & Cafe Addon for Elementor WordPress plugin allows attackers to inject malicious scripts into web pages viewed by users. The vulnerability affects all WordPress sites using this plugin version 1.5.8 or earlier. Attackers can execute arbitrary JavaScript in victims' browsers when they visit compromised pages.
💻 Affected Systems
- NicheAddons Restaurant & Cafe Addon for Elementor
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Attackers could steal session cookies, perform actions as authenticated users, redirect to malicious sites, or install malware on visitors' systems.
Likely Case
Attackers inject malicious scripts to steal user session tokens or credentials, potentially compromising user accounts and website integrity.
If Mitigated
With proper input validation and output encoding, malicious scripts would be neutralized before reaching users' browsers.
🎯 Exploit Status
DOM-based XSS typically requires user interaction (visiting a malicious page) but doesn't require authentication.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.5.9 or later
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Restaurant & Cafe Addon for Elementor'. 4. Click 'Update Now' if update available. 5. Alternatively, download latest version from WordPress repository and replace plugin files.
🔧 Temporary Workarounds
Disable vulnerable plugin
allTemporarily deactivate the Restaurant & Cafe Addon for Elementor plugin until patched
wp plugin deactivate restaurant-cafe-addon-for-elementor
Implement Content Security Policy
allAdd CSP headers to restrict script execution sources
Add to .htaccess: Header set Content-Security-Policy "default-src 'self'; script-src 'self'"
Or add to wp-config.php: header("Content-Security-Policy: default-src 'self'; script-src 'self'");
🧯 If You Can't Patch
- Implement web application firewall (WAF) rules to block XSS payloads
- Disable the Restaurant & Cafe Addon for Elementor plugin entirely
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin → Plugins → Installed Plugins for 'Restaurant & Cafe Addon for Elementor' version. If version is 1.5.8 or earlier, you are vulnerable.
Check Version:
wp plugin get restaurant-cafe-addon-for-elementor --field=version
Verify Fix Applied:
After updating, verify plugin version shows 1.5.9 or later in WordPress admin panel.
📡 Detection & Monitoring
Log Indicators:
- Unusual POST/GET requests with script tags or JavaScript payloads to pages using the plugin
- Multiple failed login attempts following suspicious page visits
Network Indicators:
- HTTP requests containing suspicious script tags or JavaScript in parameters
- Unexpected outbound connections from user browsers after visiting site pages
SIEM Query:
source="web_server_logs" AND (uri="*restaurant-cafe*" OR uri="*elementor*") AND (message="*<script>*" OR message="*javascript:*" OR message="*onload=*" OR message="*onerror=*")