WordPress Plugin Vulnerabilities

Clever Addons for Elementor < 2.1.0 - Contributor+ Stored XSS

Description

The “Clever Addons for Elementor” WordPress Plugin (https://wordpress.org/plugins/cafe-lite/) before 2.1.0 has several widgets that are vulnerable to stored Cross-Site Scripting (XSS) by lower-privileged users such as contributors, all via a similar method.

The “Banner” widget accepts a “title_tag” parameter. Although the element control lists a fixed set of possible html tags, it is possible to send a ‘save_builder’ request containing JavaScript in this parameter, which is not filtered and is output without escaping. This JavaScript will then be executed when the saved page is viewed or previewed.
The “Multi Banner” widget accepts a “title_tag” parameter. Although the element control lists a fixed set of possible html tags, it is possible to send a ‘save_builder’ request containing JavaScript in this parameter, which is not filtered and is output without escaping. This JavaScript will then be executed when the saved page is viewed or previewed.

Additionally the “animated headlines” widget does this with the “heading_tag”, though this widget does not appear to be functional in the free version of the plugin.

This is nearly identical to the recently disclosed vulnerabilities in Elementor and various Elementor Addon plugins and we reported it to the WordPress plugin repository, though it was not mentioned in our original article as it had not yet been patched at the time.

Affects Plugins

Fixed in 2.1.0

References

Classification

Type
XSS
CWE

Miscellaneous

Original Researcher
Ramuel Gall
Submitter
Ramuel Gall
Submitter twitter
Verified
Yes

Timeline

Publicly Published
2021-04-15 (about 4 years ago)
Added
2021-04-15 (about 4 years ago)
Last Updated
2021-04-18 (about 4 years ago)

Other