Vulnerabilities in 17+ Elementor add-ons for WordPress


Wordfence security researchers found that virtually all tested plugins that add functionality to Elementor were vulnerable. Many plugin publishers contacted updated their plugins, but not all of them responded, including premium plugins.

The Elementor page builder plugin itself fixed a similar vulnerability in February 2021.

This vulnerability affects add-on plugins for Elementor created by third parties.

According to Wordfence:

“We have found the same vulnerabilities in almost all of the plugins we reviewed that add additional elements to the Elementor page builder.”

So it seems that this vulnerability is quite widespread in third party plugins which are add-ons to Elementor


Continue reading below

Vulnerability of stored cross-site scripts

A stored cross-site scripting vulnerability is particularly problematic because the malicious script is downloaded and stored on the website itself. Then, when a user visits the affected web page, the browser executes the malicious script.

If the person visiting the site is logged in and has administrator level access, the script can be used to provide that level of access to the hacker and lead to a full takeover of the site.

This particular vulnerability allows an attacker with at least contributor level permission to download a script where an item (such as a header item) is supposed to be.


Continue reading below

The attack is similar to the one Elementor corrected in February 2021.

Here is how the Elementor vulnerability is described:

“… The“ Header ”element can be configured to use the tags H1, H2, H3, etc. in order to apply different header sizes via the header_size parameter.

Unfortunately, for six of those elements, the HTML tags were not validated on the server side, so it was possible for any user able to access the Elementor editor, including contributors, to use this option to add JavaScript executable to an article or page via an elaborate request. “

List of the best fixed Elementor add-ons

The below list of seventeen plugins for Elementor that have been affected are installed on millions of sites.

Among these plugins, there are over a hundred endpoints, which means that there were several vulnerabilities in each of the plugins where an attacker could download a malicious JavaScript file.

The following list is only partial.

If your third-party plugin that adds functionality to Elementor is not listed, it is imperative to check with the publisher to make sure it has been checked to see if it also contains this vulnerability.

List of the 17 best patched Elementor plugins

  1. Essential add-ons for Elementor
  2. Elementor – Header, Footer & Blocks Template
  3. Ultimate add-ons for Elementor
  4. Premium addons for Elementor
  5. ElementsKit
  6. Elementor add-ons
  7. Livemesh addons for Elementor
  8. HT Mega – Absolute Addons for Elementor Page Builder
  9. WooLentor – WooCommerce Elementor + Builder Addons
  10. PowerPack addons for Elementor
  11. Image hover effects – Addon Elementor
  12. Rife Elementor extensions and templates
  13. Add-ons for Elementor Page Builder Lite
  14. All-in-one add-ons for Elementor – WidgetKit
  15. JetWidgets for Elementor
  16. Sina extension for Elementor
  17. DethemeKit for Elementor


Continue reading below

What if you are using an Elementor plugin?

Publishers using third-party plugins for Elementor should ensure that these plugins have been updated to correct this vulnerability.

Although this vulnerability requires at least contributor level access, a hacker who specifically targets a site can take advantage of various attacks or strategies to obtain these credentials, including social engineering.

According to Wordfence:

“It may be easier for an attacker to gain access to an account with contributor privileges than to obtain administrative credentials, and a vulnerability such as this can be used to perform an elevation of privilege by running JavaScript in a review administrator’s browser session. ”


Continue reading below

If your third-party add-on to Elementor has not been recently updated to fix a vulnerability, you can contact the publisher of that add-on to check if it is safe.


Recent fixes rock the Elementor ecosystem

Source link


Comments are closed.