- April 15, 2021
- Posted by: administrator
- Category: WordPress
Millions of WordPress sites affected by vulnerabilities in Elementor add-on plugins
Wordfence security researchers discovered that virtually every plugin tested that adds functionality to Elementor had a vulnerability. Many of the contacted plugin publishers updated their plugins but not all of them responded, including premium plugins.
The Elementor page builder plugin itself patched a similar vulnerability in February 2021.
This vulnerability affects add-on plugins for Elementor that are created by third parties.
According to Wordfence:
“We found the same vulnerabilities in nearly every plugin we reviewed that adds additional elements to the Elementor page builder.”
So it seems that this vulnerability is fairly widespread within the third party plugins that are add-ons to Elementor
Stored Cross-Site Scripting Vulnerability
A stored cross-site scripting vulnerability is particularly problematic because the malicious script is uploaded to and stored on the website itself. Then when a user visits the affected web page the browser will execute the malicious script.
If the person visiting the site is signed in and has admin level access then the script could be used to provide that level of access to the hacker and lead to a total site takeover.
This particular vulnerability allows an attacker with at least a contributor level permission to upload a script in place where an element (like a header element) is supposed to be.
The attack is similar to one that Elementor patched in February 2021.
This is how the Elementor vulnerability is described:
“…the “Heading” element can be set to use H1, H2, H3, etc. tags in order to apply different heading sizes via the header_size parameter.
Unfortunately, for six of these elements, the HTML tags were not validated on the server side, so it was possible for any user able to access the Elementor editor, including contributors, to use this option to add executable JavaScript to a post or page via a crafted request.”
List of Top Elementor Add-on Plugins Fixed
The list below of seventeen plugins for Elementor that were affected are installed on millions of sites.
Of those plugins there are over a hundred endpoints, which means that there were multiple vulnerabilities in each of the plugins where an attacker could upload a malicious JavaScript file.
The following list is just a partial one.
If your third party plugin that adds functionality to Elementor is not listed then it’s imperative to check with the publisher to make sure if it has been checked to see if it too contains this vulnerability.
List of Top 17 Patched Elementor Plugins
- Essential Addons for Elementor
- Elementor – Header, Footer & Blocks Template
- Ultimate Addons for Elementor
- Premium Addons for Elementor
- ElementsKit
- Elementor Addon Elements
- Livemesh Addons for Elementor
- HT Mega – Absolute Addons for Elementor Page Builder
- WooLentor – WooCommerce Elementor Addons + Builder
- PowerPack Addons for Elementor
- Image Hover Effects – Elementor Addon
- Rife Elementor Extensions & Templates
- The Plus Addons for Elementor Page Builder Lite
- All-in-One Addons for Elementor – WidgetKit
- JetWidgets For Elementor
- Sina Extension for Elementor
- DethemeKit For Elementor
What to Do if You Use an Elementor Plugin?
Publishers using third party plugins for Elementor should make sure that those plugins have been updated to patch this vulnerability.
While this vulnerability requires at least a contributor level access, a hacker who is specifically targeting a site can leverage various attacks or strategies to obtain those credentials, including social engineering.
According to Wordfence:
“It may be easier for an attacker to obtain access to an account with contributor privileges than to gain administrative credentials, and a vulnerability of this type can be used to perform privilege escalation by executing JavaScript in a reviewing administrator’s browser session.”
If your third party add-on plugin to Elementor has not recently been updated to patch a vulnerability you may want to contact the publisher of that plugin to ascertain if it is safe.
NOTE:: This article is copyright by searchenginejournal.com and we are using it for educational or Information purpose only