CVE-2024-9867

5.4 MEDIUM

📋 TL;DR

This vulnerability allows authenticated WordPress users with Contributor-level access or higher to inject malicious scripts into web pages using the Element Pack Elementor Addons plugin. The stored XSS payload executes whenever users view the compromised pages, potentially affecting all visitors to the vulnerable WordPress site.

💻 Affected Systems

Products:
  • Element Pack Elementor Addons (Header Footer, Template Library, Dynamic Grid & Carousel, Remote Arrows) WordPress plugin
Versions: All versions up to and including 5.10.2
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with the vulnerable plugin enabled and at least one user with Contributor-level access.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal session cookies, redirect users to malicious sites, deface websites, or perform actions on behalf of authenticated users, potentially leading to full site compromise.

🟠

Likely Case

Attackers with contributor access inject malicious scripts that steal visitor session data or redirect users to phishing pages.

🟢

If Mitigated

With proper input validation and output escaping, the vulnerability would be prevented, and with least privilege access controls, the attack surface would be significantly reduced.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is technically simple once an attacker has Contributor-level credentials.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.10.3 or later

Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3180563/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'Element Pack Elementor Addons'. 4. Click 'Update Now' if update is available. 5. Alternatively, download version 5.10.3+ from WordPress plugin repository and manually update.

🔧 Temporary Workarounds

Temporary Plugin Deactivation

all

Disable the vulnerable plugin until patched

wp plugin deactivate bdthemes-element-pack-lite

Restrict User Roles

linux

Temporarily remove Contributor-level access from untrusted users

wp user list --role=contributor --field=ID | xargs wp user set-role subscriber

🧯 If You Can't Patch

  • Implement strict Content Security Policy (CSP) headers to limit script execution
  • Deploy web application firewall (WAF) rules to block XSS payloads in marker_content parameter

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Element Pack Elementor Addons > Version. If version is 5.10.2 or lower, system is vulnerable.

Check Version:

wp plugin get bdthemes-element-pack-lite --field=version

Verify Fix Applied:

Verify plugin version is 5.10.3 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to admin-ajax.php with marker_content parameter containing script tags
  • Multiple failed login attempts followed by successful Contributor-level login

Network Indicators:

  • HTTP requests containing <script> tags in marker_content parameter
  • Unexpected outbound connections from WordPress site to external domains

SIEM Query:

source="wordpress.log" AND ("marker_content" AND ("<script>" OR "javascript:" OR "onerror="))

🔗 References

📤 Share & Export