WordPress Plugin Vulnerabilities

Happy Addons for Elementor Free < 2.24.0 and Pro < 1.17.0 - Contributor+ Stored XSS

Description

The plugins have a number of widgets that are vulnerable to stored Cross-Site Scripting(XSS) by lower-privileged users such as contributors, all via a similar method: The “Card” widget accepts a “title_tag” parameter. Although the element control lists a fixed set of possible html tags, it is possible to send a ‘save_builder’ request with the “heading_tag” set to “script”, and the actual “title” parameter set to JavaScript to be executed within the script tags added by the “heading_tag” parameter.

This JavaScript will then be executed when the saved page is viewed or previewed.

The other widgets that appear to be exploitable in this manner are:

fun-factor: "title_tag" script tag + Javascript in "fun_factor_title" parameter

gradient-heading: "title_tag" script tag + Javascript in "title" parameter

icon-box: "title_tag" script tag + Javascript in "title" parameter

infobox: "title_tag" script tag + Javascript in "title" parameter

member: "title_tag" script tag + Javascript in "title" parameter

post-list: "title_tag" script tag + Javascript in "title" parameter

review: "title_tag" script tag + Javascript in "title" parameter

step-flow: "title_tag" script tag + Javascript in "title" parameter

These vulnerabilities are nearly identical to the vulnerabilities we have recently disclosed in the main Elementor plugin: https://www.wordfence.com/blog/2021/03/cross-site-scripting-vulnerabilities-in-elementor-impact-over-7-million-sites/

Affects Plugins

References

Classification

Type
XSS
CWE

Miscellaneous

Original Researcher
Ramuel Gall
Submitter
Ramuel Gall
Submitter twitter
Verified
Yes

Timeline

Publicly Published
2021-04-26 (about 4 years ago)
Added
2021-04-27 (about 4 years ago)
Last Updated
2021-04-29 (about 4 years ago)

Other