CVE-2024-9867

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') (CWE-79)

Published: Nov 5, 2024 / Updated: 14d ago

010
CVSS 5.4EPSS 0.05%Medium
CVE info copied to clipboard

Summary

The Element Pack Elementor Addons plugin for WordPress contains a Stored Cross-Site Scripting vulnerability in the 'Open Map Widget' marker_content parameter. This vulnerability affects all versions up to and including 5.10.2 due to insufficient input sanitization and output escaping.

Impact

This vulnerability allows authenticated attackers with Contributor-level access or higher to inject arbitrary web scripts into pages. These malicious scripts will execute whenever a user accesses an affected page. This can lead to various attacks, including stealing sensitive information, manipulating page content, or performing actions on behalf of the victim. The impact is classified as LOW for both confidentiality and integrity, with no impact on availability. The vulnerability has a CVSS v3.1 base score of 5.4, indicating a moderate severity level.

Exploitation

There is no evidence that a public proof-of-concept exists. There is no evidence of proof of exploitation at the moment.

Patch

A patch is available. The vulnerability has been addressed in versions after 5.10.2 of the Element Pack Elementor Addons plugin. The patch was added on 2024-11-08, as indicated by the patch details from the WordPress plugin repository.

Mitigation

To mitigate this vulnerability: 1. Update the Element Pack Elementor Addons plugin to a version newer than 5.10.2 as soon as possible. 2. If immediate updating is not possible, consider temporarily restricting Contributor-level access to the 'Open Map Widget' functionality. 3. Implement strong input validation and output encoding practices for all user-supplied content. 4. Regularly review and audit plugin permissions and user roles to ensure least privilege principles are followed. 5. Consider using Web Application Firewalls (WAF) or similar security tools to help detect and prevent XSS attacks. 6. Educate users about the risks of clicking on suspicious links or interacting with untrusted content on the website.

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

Timeline

CVE Assignment

NVD published the first details for CVE-2024-9867

Nov 5, 2024 at 12:15 PM
CVSS

A CVSS base score of 5.4 has been assigned.

Nov 5, 2024 at 12:21 PM / nvd
First Article

Feedly found the first article mentioning CVE-2024-9867. See article

Nov 5, 2024 at 12:24 PM / National Vulnerability Database
CVSS Estimate

Feedly estimated the CVSS score as MEDIUM

Nov 5, 2024 at 12:24 PM
EPSS

EPSS Score was set to: 0.05% (Percentile: 15.1%)

Nov 6, 2024 at 10:26 AM
Static CVE Timeline Graph

Affected Systems

Bdthemes/element_pack
+null more

Patches

plugins.trac.wordpress.org
+null more

Attack Patterns

CAPEC-209: XSS Using MIME Type Mismatch
+null more

News

Medium - CVE-2024-9867 - The Element Pack Elementor Addons (Header...
The Element Pack Elementor Addons (Header Footer, Template Library, Dynamic Grid & Carousel, Remote Arrows) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'Open Map...
CVE-2024-9867
Gravedad 3.1 (CVSS 3.1 Base Score) Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
CVE-2024-9867 Element Pack Elementor Addons (Header Footer, Template Library, Dynamic Grid & Carousel, Remote Arrows) <= 5.10.2 - Authenticated (Contributor+ Stored Cross-Site Scripting via Open Map Widget
The Element Pack Elementor Addons (Header Footer, Template Library, Dynamic Grid & Carousel, Remote Arrows) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'Open Map Widget' marker_content parameter in all versions up to, and including, 5.10.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected...
CVE-2024-9867 | bdthemes Element Pack Elementor Addons Plugin up to 5.10.2 on WordPress Open Map Widget marker_content cross site scripting
A vulnerability was found in bdthemes Element Pack Elementor Addons Plugin up to 5.10.2 on WordPress. It has been declared as problematic . This vulnerability affects unknown code of the component Open Map Widget . The manipulation of the argument marker_content leads to cross site scripting. This vulnerability was named CVE-2024-9867 . The attack can be initiated remotely. There is no exploit available.
CVE-2024-9867
The Element Pack Elementor Addons (Header Footer, Template Library, Dynamic Grid & Carousel, Remote Arrows) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'Open Map Widget' marker_content parameter in all versions up to, and including, 5.10.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected...
See 5 more articles and social media posts

CVSS V3.1

Attack Vector:Network
Attack Complexity:Low
Privileges Required:Low
User Interaction:Required
Scope:Changed
Confidentiality:Low
Integrity:Low
Availability Impact:None

Categories

Be the first to know about critical vulnerabilities

Collect, analyze, and share vulnerability reports faster using AI