CVE-2024-5555

6.4 MEDIUM

📋 TL;DR

This vulnerability allows authenticated attackers with Contributor-level access or higher to inject malicious scripts into WordPress pages using the Element Pack Elementor Addons plugin. The scripts execute whenever users view the compromised pages, enabling session hijacking, defacement, or malware distribution. All WordPress sites using vulnerable plugin versions are affected.

💻 Affected Systems

Products:
  • Element Pack Elementor Addons (Header Footer, Template Library, Dynamic Grid & Carousel, Remote Arrows) WordPress Plugin
Versions: All versions up to and including 5.6.5
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Contributor-level or higher WordPress user role. The vulnerability exists in the member.php module's social-link-title parameter handling.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator credentials, redirect users to malicious sites, install backdoors, or completely compromise the WordPress site and potentially the hosting server.

🟠

Likely Case

Attackers will typically inject scripts to steal user session cookies, redirect visitors to phishing pages, or display malicious advertisements for financial gain.

🟢

If Mitigated

With proper user access controls and content security policies, impact is limited to defacement or temporary disruption of affected pages.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is trivial once authenticated. Public proof-of-concept exists in vulnerability disclosures.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.6.6 or later

Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3096559/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Element Pack Elementor Addons'. 4. Click 'Update Now' if available. 5. If no update appears, manually download version 5.6.6+ from WordPress.org and replace plugin files.

🔧 Temporary Workarounds

Disable vulnerable module

all

Temporarily disable the Member module that contains the vulnerable code

Navigate to Element Pack settings in WordPress admin and disable Member widgets

Restrict user roles

all

Remove Contributor role access or limit who can create/edit posts

Use WordPress role management plugins or custom code to restrict Contributor capabilities

🧯 If You Can't Patch

  • Implement Content Security Policy (CSP) headers to restrict script execution
  • Install Web Application Firewall (WAF) with XSS protection rules

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Element Pack Elementor Addons → Version number. If version is 5.6.5 or lower, you are vulnerable.

Check Version:

wp plugin list --name='Element Pack Elementor Addons' --field=version

Verify Fix Applied:

After updating, verify version shows 5.6.6 or higher. Test social-link-title parameter input to ensure scripts are properly sanitized.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to member.php with script tags in parameters
  • Multiple failed login attempts followed by successful Contributor login

Network Indicators:

  • Unexpected script tags in page responses containing 'social-link-title'
  • External script loads from unusual domains in page content

SIEM Query:

source="wordpress.log" AND ("social-link-title" AND ("script" OR "javascript" OR "onclick"))

🔗 References

📤 Share & Export