CVE-2024-8440

6.4 MEDIUM

📋 TL;DR

This stored XSS vulnerability in Essential Addons for Elementor plugin allows authenticated attackers with contributor-level access or higher to inject malicious scripts via the Fancy Text widget. The scripts execute when users view affected pages, potentially compromising visitor sessions. All WordPress sites using this plugin up to version 6.0.3 are affected.

💻 Affected Systems

Products:
  • Essential Addons for Elementor Lite
  • Essential Addons for Elementor Pro
Versions: All versions up to and including 6.0.3
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires contributor-level or higher WordPress user role. Elementor page builder must be installed.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal admin credentials, redirect users to malicious sites, deface websites, or install backdoors leading to complete site compromise.

🟠

Likely Case

Session hijacking, cookie theft, or defacement of public-facing pages through injected malicious scripts.

🟢

If Mitigated

With proper user role management and content review, impact limited to isolated page defacement.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward once authenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.0.4

Vendor Advisory: https://wordpress.org/plugins/essential-addons-for-elementor-lite/#developers

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find Essential Addons for Elementor. 4. Click 'Update Now' if available, or manually update to version 6.0.4+. 5. Clear any caching plugins/CDN caches.

🔧 Temporary Workarounds

Disable Fancy Text Widget

all

Temporarily disable the vulnerable widget until patched

Add to theme's functions.php: add_filter('elementor/widgets/register', function($widgets_manager) { $widgets_manager->unregister_widget_type('eael-fancy-text'); });

Restrict User Roles

all

Limit contributor-level access to trusted users only

🧯 If You Can't Patch

  • Review and audit all content created by contributor-level users for suspicious scripts
  • Implement Content Security Policy (CSP) headers to restrict script execution sources

🔍 How to Verify

Check if Vulnerable:

Check plugin version in WordPress admin > Plugins > Essential Addons for Elementor. If version is 6.0.3 or lower, you are vulnerable.

Check Version:

wp plugin list --name='essential-addons-for-elementor' --field=version

Verify Fix Applied:

Confirm plugin version is 6.0.4 or higher. Test Fancy Text widget with script payloads to ensure they are properly sanitized.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to elementor/ajax endpoints
  • Multiple page edits by contributor users in short time

Network Indicators:

  • External script loads from unexpected domains in page responses

SIEM Query:

source="wordpress.log" AND "eael-fancy-text" AND ("script" OR "onerror" OR "javascript:")

🔗 References

📤 Share & Export