CVE-2024-9682

6.4 MEDIUM

📋 TL;DR

This stored XSS vulnerability in Royal Elementor Addons plugin allows authenticated attackers with contributor access or higher to inject malicious scripts into WordPress pages. The scripts execute when users visit compromised pages, potentially stealing credentials or performing unauthorized actions. All WordPress sites using vulnerable plugin versions are affected.

💻 Affected Systems

Products:
  • Royal Elementor Addons and Templates WordPress plugin
Versions: All versions up to and including 1.7.1001
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress with Elementor and the vulnerable plugin installed. Contributor-level access or higher needed for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator credentials, deface websites, redirect users to malicious sites, or install backdoors for persistent access.

🟠

Likely Case

Attackers with contributor accounts inject malicious scripts to steal user session cookies or credentials, potentially escalating privileges.

🟢

If Mitigated

With proper user access controls and content security policies, impact is limited to isolated script execution without data compromise.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward once attacker has contributor privileges.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.7.1002

Vendor Advisory: https://plugins.trac.wordpress.org/browser/royal-elementor-addons/tags/1.7.1002

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find Royal Elementor Addons. 4. Click Update Now or manually update to version 1.7.1002+. 5. Clear any caching plugins/CDN caches.

🔧 Temporary Workarounds

Disable Form Builder Widget

all

Temporarily disable the vulnerable Form Builder widget until patching

Restrict Contributor Access

all

Temporarily remove contributor role access or limit to trusted users only

🧯 If You Can't Patch

  • Implement Content Security Policy (CSP) headers to restrict script execution
  • Enable WordPress security plugins with XSS protection features

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Royal Elementor Addons version. If version is 1.7.1001 or lower, you are vulnerable.

Check Version:

wp plugin list --name=royal-elementor-addons --field=version

Verify Fix Applied:

After updating, confirm plugin version shows 1.7.1002 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to form submission endpoints
  • Suspicious script tags in page content or form submissions

Network Indicators:

  • Unexpected script loads from form pages
  • Suspicious outbound connections from form submissions

SIEM Query:

source="wordpress" AND ("royal-elementor-addons" OR "form-builder") AND (POST OR suspicious_script)

🔗 References

📤 Share & Export