CVE-2024-9994
BaseFortify
Publication date: 2025-06-07
Last updated on: 2025-07-14
Assigner: Wordfence
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| wpdeveloper | essential_addons_for_elementor | to 6.1.13 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-79 | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a Stored Cross-Site Scripting (XSS) issue in the Essential Addons for Elementor WordPress plugin, specifically in the Pricing Table Widget. It occurs via the 'eael_pricing_item_tooltip_content' parameter due to insufficient input sanitization and output escaping. Authenticated users with contributor-level access or higher can inject malicious scripts that are stored and executed whenever any user views the affected page.
How can this vulnerability impact me? :
The vulnerability allows attackers with contributor-level access or above to inject arbitrary web scripts into pages. This can lead to unauthorized actions such as stealing user credentials, session hijacking, defacement, or delivering malware to users who visit the infected pages. Since the scripts execute in the context of the website, it can compromise the security and trustworthiness of the site.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
Detection of this vulnerability involves identifying if the affected WordPress plugin 'Essential Addons for Elementor' is installed and its version is up to 6.1.12. Additionally, monitoring for suspicious stored scripts in the Pricing Table Widget's tooltip content (parameter eael_pricing_item_tooltip_content) can help. Since the vulnerability requires authenticated contributor-level access, checking for unusual changes or injections in pages using this widget is advised. Specific commands could include: 1) Using WP-CLI to check plugin version: `wp plugin get essential-addons-for-elementor --field=version` 2) Searching the WordPress database for suspicious script tags in the pricing table tooltip content, e.g., using SQL: `SELECT * FROM wp_postmeta WHERE meta_key LIKE '%eael_pricing_item_tooltip_content%' AND meta_value LIKE '%<script>%'` 3) Web server logs can be inspected for POST requests to pages with the Pricing Table Widget from contributor-level users. However, no explicit detection commands are provided in the resources.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include updating the Essential Addons for Elementor plugin to a version later than 6.1.12 where the vulnerability is fixed. If an update is not immediately available, restrict contributor-level user permissions to prevent unauthorized script injection. Additionally, review and sanitize any user-supplied content in the Pricing Table Widget, especially the eael_pricing_item_tooltip_content parameter. Monitoring and removing any injected scripts from affected pages is also recommended.