CVE-2024-8962
📋 TL;DR
The WPBITS Addons For Elementor plugin for WordPress has a stored XSS vulnerability in versions up to 1.5.2. Authenticated attackers with Author-level access can upload malicious SVG files containing JavaScript that executes when users view those files. This affects all WordPress sites using the vulnerable plugin version.
💻 Affected Systems
- WPBITS Addons For Elementor Page Builder
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Attackers could steal admin credentials, deface websites, redirect users to malicious sites, or install backdoors for persistent access.
Likely Case
Attackers inject malicious scripts to steal user session cookies, redirect visitors to phishing sites, or display unwanted content.
If Mitigated
With proper user access controls and content security policies, impact is limited to isolated script execution within the SVG context.
🎯 Exploit Status
Exploitation requires authenticated access but is technically simple - just uploading a malicious SVG file.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.5.3 or later
Vendor Advisory: https://wordpress.org/plugins/wpbits-addons-for-elementor/#developers
Restart Required: No
Instructions:
1. Log into WordPress admin panel
2. Go to Plugins → Installed Plugins
3. Find 'WPBITS Addons For Elementor'
4. Click 'Update Now' if available
5. If no update appears, manually download version 1.5.3+ from WordPress.org
🔧 Temporary Workarounds
Disable SVG uploads via .htaccess
linuxPrevent SVG file uploads at the web server level
Add to .htaccess: <FilesMatch "\.svg$">
Order Allow,Deny
Deny from all
</FilesMatch>
Restrict user roles
allLimit Author-level and higher access to trusted users only
🧯 If You Can't Patch
- Temporarily disable the WPBITS Addons plugin until patched
- Implement Content Security Policy (CSP) headers to restrict script execution
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin → Plugins → WPBITS Addons For Elementor → Version. If version is 1.5.2 or lower, you're vulnerable.
Check Version:
wp plugin list --name="WPBITS Addons For Elementor" --field=version
Verify Fix Applied:
After updating, verify plugin version shows 1.5.3 or higher in WordPress admin panel.
📡 Detection & Monitoring
Log Indicators:
- Unusual SVG file uploads by Author-level users
- Multiple failed SVG upload attempts
Network Indicators:
- Requests to SVG files with suspicious parameters
- External script loads from SVG file accesses
SIEM Query:
source="wordpress" AND (event="plugin_update" AND plugin="wpbits-addons-for-elementor" AND version<="1.5.2") OR (event="file_upload" AND file_extension="svg" AND user_role="author")
🔗 References
- https://plugins.trac.wordpress.org/browser/wpbits-addons-for-elementor/trunk/includes/elementor-config.php#L721
- https://plugins.trac.wordpress.org/changeset/3200392/
- https://wordpress.org/plugins/wpbits-addons-for-elementor/#developers
- https://www.wordfence.com/threat-intel/vulnerabilities/id/f735f05d-8178-46bd-894d-49ccfb31d304?source=cve