[WordPress Security] Eleven Vulnerabilities Patched in Royal Elementor Addons

From: Wordfence <list_at_wordfence.com>
Date: Tue, 10 Jan 2023 09:27:29 -0800

Vulnerabilities included access control issues that could potentially be used to take down a site as well as XSS and CSRF

Wordfence-Logo.png (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWLhLk4DlSzHW8clWy65PWZ2VW4dVnpw4VDTv1N4qMxKt3pdqSV1-WJV7Cg-61W1hC03q2RNtZlW6c4mQx28N_5sW23m5cs1Zlm6FW82dVXR4dzh69W4n4_vn3YdmlMW1d-rT668bV0TW2D7MZ759PztlW7ZXTZw5Qk-lYW7B9TzS9bkZXVW8q55dH3LjcxzW4fwDVd2LjGHmW8Tbp1f7szBRsW6080cC1BSN8sW2G0y9k8ZV77YN53dwGVM64TJW8-9Hb41Qq8MfW5h16td81qzSlW6hxHVT3yLRqJW16jzRZ3ZK4ZgN3ylbyBTMclB3lMT1 )

Eleven Vulnerabilities Patched Royal Elementor Addons (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWLhLk4DlSzHW8clWy65PWZ2VW4dVnpw4VDTv1N4qMxLG3pds1V1-WJV7CgCdfW4RcWtZ1Y02z9W8RthJk7M7hksW8tlc-c1sDZBzW1qmZmx7GBNJGW5LvQPS86zQL8W2Jj0Bx2YRHb2VlRb4M8-M-PlW6BK4pV2QZkGFW2CDTw219-Sm3W3Gv7K17wfkk8W7qJZmq95lt5KW4D-bJT5j1hm9W5MzVw315LKhyW4d8-4Q3TFQsKVHsglz5k1bdbN11NnyTXw90NW1yCk7j8SV92BW57vpMD7Dq5_7W7DPx__6mFbfcW95cz_65lfrRWW4Kg-3J1gNP_ZW3r11x_1jy780VSKkhP6bMQ4cW1S7bRJ3HrS5tW3y0YJy5vLFxmW6WPKPZ7yH00WW6y0vJc1n2TQtVL_t4x776NYw377G1 )

On December 23, 2022, the Wordfence Threat Intelligence team initiated the responsible disclosure process for a set of 11 vulnerabilities in Royal Elementor Addons, a WordPress plugin with over 100,000 installations. The plugin developers responded on December 26, and we sent over the full disclosure that day.

We released a firewall rule protecting against these vulnerabilities to Wordfence Premium (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWLhLk4DlSzHW8clWy65PWZ2VW4dVnpw4VDTv1N4qMxL33pdrrV1-WJV7CgCvlVDSNsL6j-mtWW3gznDD4KsvGWVj5gw03BT56PW4HT2GL336nsxW4bhn1p64CNHPN5d3pjwlJwdVW1MkYp03yCtLjW7WJs-92vNb6gV3tf5Q17YdyGW1g3_vL9j9sykW84yNQC7t-7TSW2Bz1jT4jvTbnW6Cf9Ql1r109gN8JHxlkDMGzyW6nz9CK7GJR-fW12vhH933Q9-4W184zc43VysF2N333BC249pLMW3rgkBS7VY1MmW2TDKth8jCzdQW6Nfgwb1BDvpcN1c1_qcLlvJ5W5Qq5Xm8zkkbSW29RP0h6JMWS-39Zw1 ) , Care (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWLhLk4DlSzHW8clWy65PWZ2VW4dVnpw4VDTv1N4qMxL33pdrrV1-WJV7CgPnNW6zDBj_6H6DF3N4d_q1tp9R80N4N3RrjpS2VCN6MZlZrFML1-W5Fr-Lp7hlX65W5P475x9lG1t0W2KZTWR1T-bHTW6KgJj730sC3wW3FdXx84btd9zW4Pz4sM1tGdDVW7YbLLv4DDg2gW2hvfcM4sYNrkVGT3V12L4dzHW41wBvw4glRqfVqw1PK2gBZlGW8sD03N4kb81gW31YfKJ85QYnmW4DsMwP5LyPx0W2mQsjF13sh9kW6QKhK381dfmyM8LQFRtsBPqW6vY0K87mt4tlW24yV2N8kDhxxW2J-s-F5QDBQW25j1 ) , and Response (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWLhLk4DlSzHW8clWy65PWZ2VW4dVnpw4VDTv1N4qMxL33pdrrV1-WJV7CgSr9VskNLl1-lc3GW5cZw-H6qLChbW844Nls8xYhggN4NQf3y3y4bsN4g2722bZs5PW14xSBs2-dmq9W5dBjrY3K1WWWW7fKCXJ4k3_ZRN5JmlTGBY2HPW2fQbZF80L_ZCN7l51pKv27LLW83n-Cb3j68PTW47Z0qt80-2LHW4w1Qr47R2Lc4W6DhJ758j3GYzW15_gsn1qCcByW2CnzQv909dgPV35dGF269phZW8k4mbZ1RNkyQW48SJqK16QfF8W5pFxNK4n6QmHW96WZ2f1V0FjgW1Lfnv867WgbGW4cxkgJ3JJcz03djm1 ) customers on December 23, 2022. Sites still running the free version of Wordfence will receive the same protection 30 days later, on January 22, 2023.

While none of the vulnerabilities were critical, several of them could have been used by any authenticated user to modify content, disable plugins, or even temporarily take down the site in some circumstances. Additionally one of the patched vulnerabilities was a Reflected Cross-Site Scripting vulnerability which could have been used to take over the site if an attacker was able to trick an administrator into performing an action, such as clicking a link.

This email content has also been published on our blog and you're welcome to post a comment there if you'd like to join the conversation. (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWLhLk4DlSzHW8clWy65PWZ2VW4dVnpw4VDTv1N4qMxLG3pds1V1-WJV7CgCdfW4RcWtZ1Y02z9W8RthJk7M7hksW8tlc-c1sDZBzW1qmZmx7GBNJGW5LvQPS86zQL8W2Jj0Bx2YRHb2VlRb4M8-M-PlW6BK4pV2QZkGFW2CDTw219-Sm3W3Gv7K17wfkk8W7qJZmq95lt5KW4D-bJT5j1hm9W5MzVw315LKhyW4d8-4Q3TFQsKVHsglz5k1bdbN11NnyTXw90NW1yCk7j8SV92BW57vpMD7Dq5_7W7DPx__6mFbfcW95cz_65lfrRWW4Kg-3J1gNP_ZW3r11x_1jy780VSKkhP6bMQ4cW1S7bRJ3HrS5tW3y0YJy5vLFxmW6WPKPZ7yH00WW6y0vJc1n2TQtVL_t4x776NYw377G1 ) Or you can read the full post in this email.

Vulnerability Details

The primary set of issues we found with Royal Elementor Addons was due to a lack of access control and nonce checks on various AJAX actions in the plugin.

Description: Insufficient Access Control to Theme Activation

(https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWLhLk4DlSzHW8clWy65PWZ2VW4dVnpw4VDTv1N4qMxKN5mNYkV3Zsc37CgGJzW3msQcx989KBtW8XhJbD2qF6rrW4xHpd73QcX_HN7RlNQvF8JkvW7pYdn36PKjFJW8YWq0x2YW53XW6glt7p2nbw61W25j5MQ4m2bdRW3dWxKr5wfwMFW2YN-kc2KK15rW27-kNt1pNmPbW3gDrVg6qbF6nF87cwgzZ4xQW3m4GdD4QdqbdW6MfV6r7p66_HW7xWtQP17wFMdV29gYh75Wcq7W3v3hLT2hgfmYN3CrFbckX4zJW13_nQ61C-v9TW36__ZT6pg0SxW4yBXv45n2rt4W7TkMSF1SbFwrW47Mt4W6_gxj_W7SsYJs6l0xdvW6Hf3NT2TwzvRW7fkkqh5tbwmyW7hkKlW8kbDQ3W5z_tzW1_MhbrW6mSgP93bRJzPW6Tq1_Q68-zTqW7xhg6R7LjBdNW5WbqgY1hPcKRV_pmZ37Z6KSHW3bNXcM8CV-50W6BYZZD1QqJX3W7VMfQ85xQBF0W6v7mSj6Lxb5736-b1 ) Affected Plugin: Royal Elementor Addons

Plugin Slug: royal-elementor-addons

Affected Versions: <= 1.3.59

CVE ID: CVE-2022-4700

CVSS Score: 5.4 (Medium)

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L

Researcher/s: Ramuel Gall

Fully Patched Version: 1.3.60

Royal Elementor Addons has an option to quickly activate the recommended Royal Elementor Kit theme. Unfortunately, this is performed via an AJAX function, wpr_activate_required_theme, which did not perform capability or nonce checks, or even check if the theme was installed on the site. This meant that any logged-in user, such as a subscriber, could change a vulnerable site’s theme. If the Royal Elementor Kit theme was not installed on the site, this would result in a loss of availability as the site would fail to load and instead display an error message.

Description: Insufficient Access Control to Plugin Deactivation (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWLhLk4DlSzHW8clWy65PWZ2VW4dVnpw4VDTv1N4qMxKN5mNYkV3Zsc37CgNkjW67ZGy52BHsDLW4N-LTw2mRHKJW8qYGBl7W_53qMrCltsn2vsrN8-2Hm2lnk21W4ZjYvs3p95WFW1Nz-9n8v88QhW4qpdnl3RYkbSW1cTQBP7W51dXW5GS2vb7CbprVW6DYkPV1RHCZqVdswsK4qXq_lTX7rc4KN-X6W7kNH953rLCy_W5TTYsL64m8n7W284-0h3CfhrVW7mn4x_3nSvyRW3gD6fR5KppSnW8LNCTq2rgf7BW6bvRsK11h0CsW58xbF01bRf29W5sL-3b4B2x8QW46sx005pW7yvW18FQ9p1TxXgmW6KT5lH9dMHrSV-yZvL46_DjdW8FfW-f121m_zW3nXjDt715R5LW2f1-2Y8kQfMRV7bwH66B_CY_W2wP9t41hTLzDW2t5_zv2zvB2wW17Xc9695YQbjW4LH3lt2m6DSvN6vzpyJtRfrlW9grqVD4MJRJnW8nC5Lz6lP9gLW1n39CQ3N63502HG1 )

Affected Plugin: Royal Elementor Addons

Plugin Slug: royal-elementor-addons

Affected Versions: <= 1.3.59

CVE ID: CVE-2022-4702

CVSS Score: 5.4 (Medium)

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L

Researcher/s: Ramuel Gall

Fully Patched Version: 1.3.60

Royal Elementor Addons has an option to revert the site to a “compatible” state for imported templates via the wpr_fix_royal_compatibility AJAX function. This involves deactivating all but a short list of hard-coded plugins. As the function did not use capability or nonce checks, this means that any authenticated user could deactivate plugins necessary for site functionality as well as any security plugins that do not specifically block this action. This could cause the site to become unavailable or vulnerable to additional exploits.

Description: Insufficient Access Control to Template Import

(https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWLhLk4DlSzHW8clWy65PWZ2VW4dVnpw4VDTv1N4qMxKN5mNYkV3Zsc37CgQvNW4nMgf-8sMr3VVt9r_M4czZdvW2FhSQs6GwpL5VTl3QZ5Dr4-fW93v6Zc61G0nfV2B8x-8YF2-nW6v5Wrt3xnq29W6g9qZW4k8r3QW2VlGgz4nxDX-W7cQFdP8ctVGyW8J94j14p0TMQW76Kzq83PkwpTN2k287CjTTK_W2S4Zy26LW7hMW5tGkg42HH7lHW8r5j2T37JFLBV2v8qd5MCj5YW3xNHqr98h2ZjW2VXnmQ2TrnN6W82t-g81ld3jkW1l9fND4rkBQ3W8ScLmk50hRGLW2YVtBw3DqwS1W5xfMY_1Ww9NPW3hq_Qy8hJbWdW6ZFl7z7P_QWxW80jKZc3ytC9sW4-7XvT3f5K40W1byvBL8sNMkcW1BJgmm5T7Y_1VxJ0-z75ZbWWN8Zn-JhM5Y6MN5YFlkp_xhkFW8z9ZV628scnnW8JdY5z1Wlb6WW3f-Crf8pQBLbN1hkdn11TqcRW6KwclT4KwD0L3bHs1 ) Affected Plugin: Royal Elementor Addons

Plugin Slug: royal-elementor-addons

Affected Versions: <= 1.3.59

CVE ID: CVE-2022-4704

CVSS Score: 5.4 (Medium)

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L

Researcher/s: Ramuel Gall

Fully Patched Version: 1.3.60

Royal Elementor Addons allows importing preset templates via the wpr_import_templates_kit AJAX function. Vulnerable versions of the plugin do not include capability or nonce check for this function, so any authenticated user could import templates, potentially overwriting any existing templates.

Description: Insufficient Access Control to Plugin Activation

(https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWLhLk4DlSzHW8clWy65PWZ2VW4dVnpw4VDTv1N4qMxKN5mNYkV3Zsc37CgVSNN5FWw-Zm8vK4W6kZDfl8V5ZCrW4CLLHt9fjly8N2PCHVnhCYcrW7YyKtt32lB4CW33YkVX67mkgRW5VzhCg7kG4p6VCy3nh9bZKDbW2SgD4v6lyYDVW771cCl8XS599N4_gmYPLkBx7W2GRgXx4QY3rYN4qVT62vkwj4W4ffX5v8bkvDdW5Bq5pd5vqwJBW27GRMr6HBGzzW3DrTY046PpqQN6gMtrsB1ktGN74h3yvKyBhpW8xzqGq7Nv0qYW7TTVn743F1DbMJ0YkDFZgZZV2Wl1_8gMq1gW42Zpkm5Qd54tW8zrRq_70YM1RW7l1l_k3PgWqnW23JMSQ4nmHHrW93YyWn8w-Bh5N2cqn1kGtmClW4hWDbl8MRBh0W38QsMk5WJ_ssW5pZ7Zg8tngBjW432czv3LqMXyW40sm-x12HLnPW19CNPr28XJZwW7qBjQD6Rxj_BW7dNQBP96T3GsW5T28j87nJmt33p8m1 ) Affected Plugin: Royal Elementor Addons

Plugin Slug: royal-elementor-addons

Affected Versions: <= 1.3.59

CVE ID: CVE-2022-4701

CVSS Score: 4.3 (Low)

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

Researcher/s: Ramuel Gall

Fully Patched Version: 1.3.60

Royal Elementor Addons has an option to activate the 'contact-form-7', 'media-library-assistant', or 'woocommerce' plugins if they are installed on the site via the wpr_activate_required_plugins AJAX action, and this functionality was available to any logged-in user. Fortunately the impact of this vulnerability is quite minimal as it would only allow an attacker to activate three select plugins.

Description: Insufficient Access Control to Import Deletion

(https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWLhLk4DlSzHW8clWy65PWZ2VW4dVnpw4VDTv1N4qMxKN5mNYkV3Zsc37CgBvLW1f4ywf7GK2-QVrysz25xWsfGW4cmJtf6lQ3YWW2SCkhl1SRVKfVN3Bh-8HMc4qVBx0Bq6JlJdvW1J7m9t79sf3XW7WT-_r3HtkRBW7rSzVl92dq05W4QkvTN6CCC5LW6tp0Yj9lHSf6W4ymMh75lg8qGW7NLgvV6p35DMW923mCk9flrXZW6-rZpt2ym3FHW7D92mg32q_TXW1R4Nzj5ntD36W5469fX4NTX9fW4jSv0r5Tkd83W6sz_nJ6hq_qbW14NpJm1Z4PF5W67sCvN3fNH7DW89q1T83-wS4pW7_c3jS3mKpN0W4JNQF08YH7HZW6kx4c044VFM1W6ZtT0R8xM3VPW11rYnX65hBJFW26LpnB29wYVlW1Y9CN26N3twxW7WML_B1m4kf1W8MMjLK7v6GzlW2Bc9Yn2GjWhjW8wCX8T3P_xLhW3pkjrG2tDfMYVcVRdp3d3yYgW8K6v993ZBbZ-Vz20tk3Sm-mC3m-N1 ) Affected Plugin: Royal Elementor Addons

Plugin Slug: royal-elementor-addons

Affected Versions: <= 1.3.59

CVE ID: CVE-2022-4703

CVSS Score: 4.3 (Low)

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L

Researcher/s: Ramuel Gall

Fully Patched Version: 1.3.60

Royal Elementor Addons has an AJAX action, wpr_reset_previous_import, used to delete previously imported content when importing new content. However, since it is accessible to any authenticated user, this could be used to delete imported content without importing new content, potentially resulting in site availability issues.

Description: Insufficient Access Control to Template Activation

(https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWLhLk4DlSzHW8clWy65PWZ2VW4dVnpw4VDTv1N4qMxKN5mNYkV3Zsc37CgYnsW7vsL5v2mX2qXW3M70Tr8BRCr6W17bb3g8P109wVXH5jQ69JdNbW3SGLVD5D_LH1N5yNmBTfMRnqW1kvWF-8nP3f9W7M-_Hf11Qv2TW562dvG3KVqT3W1lrHG66nPxqgVFBzSs89XN0PW7qmnN03yGK8wW1DvDLp8TCr7gVhm26m4yGdcGW94zGHH5CXn3QW2Byp2y2FdGV1W8P3zCp2cKMgzW5MsV0W2vFXhCW57PNkJ2pKCx7W3-ZYms4j_bz0W89NtKN5PHzphW6jH5PS6nSrQRW7HGmmt5LklF4W80QTPh6Qd3fsN11CT8GgSMdQW1cNMbf5RcGX1VkqL0j37b8GtW11GTqd9jxt7cN8kd6DQZj-byN6fK77szzqDBW4J3PmY72JNsXW6dsrs04y55-6N3Wg0LQLw_wdW31DPzY7GfWqSW6g65mm8_bcnxW14-9vy2FdgC0W2_lP7533NQJbW4MYvgH5vxfSl32m71 ) Affected Plugin: Royal Elementor Addons

Plugin Slug: royal-elementor-addons

Affected Versions: <= 1.3.59

CVE ID: CVE-2022-4705

CVSS Score: 4.3 (Low)

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

Researcher/s: Ramuel Gall

Fully Patched Version: 1.3.60

Royal Elementor Addons uses the wpr_final_settings_setup AJAX action to finalize activation of preset site configuration templates, which can be chosen and imported via a separate action. As with the other vulnerabilities recorded here, any authenticated user could access this functionality, though the impact of this vulnerability was lower.

Description: Insufficient Access Control to Menu Settings Update

(https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWLhLk4DlSzHW8clWy65PWZ2VW4dVnpw4VDTv1N4qMxKN5mNYkV3Zsc37CgHYhVzlLDp62vwv1W5ZVrCS6s_HZNW8BYPvv54hK1GW4fyq08330hb6VTBm8S1xj5qjW1WWhqr3K07gGW95nKC63pYtcgW2MMQ651-94jbW26K_-H6QCSkVW1QBvMl7K83CtW39ZMr16X3_sxW1Xjmfl4GWh_TW5vmdNY34C7xGN3PRyb7cfygCW8CrkVF5SMDrnW6tRfc_7HbWmkW6Gz3QH1Gb5sGW2JLgrl5Nlh5ZW7GyPXn2CPBTpW1tbTbg1XsSdTM6qYzds8smyW4Qz3zB10FRQ7W41zt1m58m0dmW70KKR_7xy30PN2KWHrw8jNwNW982Vns2_qmnwW6cwzfW6jMfhxW8KWbfg3MgDMrW6Kg7RP2TCsFPN8r-n-__X_Y_W2QTzFm3dFYQBW3F18M45JbyqLW2NvQw13X_gw3N8lhtrRPFWYkW8tCWLd8gwmrWW5XNgT46F_wKqW7Wz1m22sshJ9W8ph8zC5py24g36Dc1 ) Affected Plugin: Royal Elementor Addons

Plugin Slug: royal-elementor-addons

Affected Versions: <= 1.3.59

CVE ID: CVE-2022-4711

CVSS Score: 4.3 (Low)

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

Researcher/s: Ramuel Gall

Fully Patched Version: 1.3.60

Royal Elementor Addons uses the wpr_save_mega_menu_settings AJAX action to update mega menu settings. As with the other vulnerabilities we found, this action called a function that did not include a capability check or a nonce check, so any authenticated user could update menu settings.

Description: Insufficient Access Control to Template Conditions Modification

(https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWLhLk4DlSzHW8clWy65PWZ2VW4dVnpw4VDTv1N4qMxL35mNYDV3Zsc37CgTtcW6n-d1j4s4T2zW8rMNL367xyDmVmjmb22yVlxFW8wppd-5QgwlQMw3_l9G_XCzN8JjS-LVtMsTW6fG0Qr48hHdXN4-b5wxj-b0BW8ySkk_4trwnjW47hSBK5LnHzvVm6N8j6qsxRqW53rCgz4rBJ21W2gDBfT6ycfMKW3nqyz18TDs9GW3PM2Xj1cpw53W8Ntb1p5wR_3KW3_ZZHW79ZvK4W80kW0L7_Z9QtW7H8cr04wJhxJW38qYrQ9gSx-8W8SqsRN7wsdXVW4krx935qhWr-W2crFZZ79v8bzW7tsrfN3vPCRMW71C1851P3V11W4nwCyh3HSMRlW28TPWk85chcXW2pC3WC1d89VXW55Hgsb8-FXzKW1nRMtX6LyM4jW5wVgHx7Fzy4RV__r7K6hljClW3VqSPR8w17jXN5M7JXwgZyw1W83Y6lx7XNplSW8X3xfj8m2n_sW5QsP0r5q7kD6W2kXx8C11K870W29glM940T7vZW19VPXZ5vvZLW3mTN1 ) Affected Plugin: Royal Elementor Addons

Plugin Slug: royal-elementor-addons

Affected Versions: <= 1.3.59

CVE ID: CVE-2022-4708

CVSS Score: 4.3 (Low)

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

Researcher/s: Ramuel Gall

Fully Patched Version: 1.3.60

Royal Elementor Addons uses the wpr_save_template_conditions AJAX action to save template conditions, determining when a given template will be displayed and used. The action called a function that was accessible to any authenticated user.

Description: Insufficient Access Control to Template Kit Import

(https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWLhLk4DlSzHW8clWy65PWZ2VW4dVnpw4VDTv1N4qMxKN5mNYkV3Zsc37CgN9_W4mTjK75LfgsTW2bcPkw8LRYhnVYswMR5fF2dTW2GHrxf6t_rnpW1fgxlX623qQSW1zjvbQ7lLP31W4lqfnZ8HNpWxW8xGcK54z3m53W79cDGg4nq8yGV-qKlH2z9YmJW4P_RT8104Yx9W3-3-Hy6Zg0_cW5r0cJ12Cgtd1W52R7vc1RJZH_W82vlbs6wF9q5W1szZcn24f2WbV368jd2f9njCN7Q2glKVQfXgVysrHW57t3GxW1-Bl7b3RxT3SW2V4DPx2CNcq1W6vqTcC76PcLBW348xJx13-w2MVnLbQz4cSfSgN3y14w4wgPNvW3tcy2X2qWgmjW1j2K9n69XdbQM15sGl1GczVW3p_vMg3x39nYW1rfmx49jmK0rW1M3sLt26BbmdW1Y5Vb_1Gcq1yW3TZXys5nt3xQW7jg55R48rGcFW3bV6fK4L8PJCW18nKd47jjCQcW8PvrYw4kk51GN1ZNDJLL_nbV3mG81 ) Affected Plugin: Royal Elementor Addons

Plugin Slug: royal-elementor-addons

Affected Versions: <= 1.3.59

CVE ID: CVE-2022-4709

CVSS Score: 4.3 (Low)

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

Researcher/s: Ramuel Gall

Fully Patched Version: 1.3.60

Royal Elementor Addons uses the wpr_import_library_template AJAX action to import and activate templates from the plugin developers’ template library. As with other vulnerabilities reported here, the action called a function that did not include a capability or nonce check, allowing any authenticated user to access it.

The final vulnerabilities we found did not exactly fit the pattern of the others - one was a lower-severity Cross-Site Request Forgery(CSRF) and the other, a higher-severity reflected Cross-Site Scripting(XSS).

Description: Cross-Site Request Forgery to Menu Template creation

(https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWLhLk4DlSzHW8clWy65PWZ2VW4dVnpw4VDTv1N4qMxL35mNYDV3Zsc37CgCdmW99sV0n7z8gJLW6NN-9s4V7np5W1-Bzn11G1Jl1W36PjDZ3V15V3N1VLsgYZJ4y9W7Whkj65hFcZfW4Z6n2t3xh-SjW59fvhS1thQ7PN2Rybyg25T38W32-_Q95T2P7LW70QtQv8z2WWFW3XpFkY4-83l2W4KRwf-7vynt-W2GFMpD8V5ssDW1bz8Wt1hqWzcW6hx-xb2rlhg6W7QxdpZ2RPtcFW26PRGH8ZLTwNM1bsq8y5ktmW4ncX-l8hNtJ3W2S2dBQ8_KLHvW2Vp7Yt7bRF4HW6RyTmC1hPydLW5RbnZ477v6g_VT6Ffm5Qmk4YW3h5pn93GmNhfW73VBwd4m429gW4xvfJh5r3-xjW4L4hCQ4Nd2hKW5QM4vr5hHH4SN4nxrc2Ch2zGN2P6r_vF3MQtVN4F4S1mmxgCW3Ncj763VKbCNW7Sn2vs2xq0gvW1xC4zN5XBCZ0W5YGSz28jCTjxW1Yy1xL48QXQ0W2wZLvJ4ZlX7NN55CT4qvYqkH34Lt1 ) Affected Plugin: Royal Elementor Addons

Plugin Slug: royal-elementor-addons

Affected Versions: <= 1.3.59

CVE ID: CVE-2022-4707

CVSS Score: 4.3 (Low)

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N

Researcher/s: Ramuel Gall

Fully Patched Version: 1.3.60

Unlike the other AJAX actions we’ve mentioned so far, wpr_create_mega_menu_template, which is used to create new menu templates, did include access control. It was, however, still lacking a nonce check, so an attacker could trick a logged-in administrator into performing an action that would result in a menu template being created.

Description: Reflected Cross-Site Scripting

(https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWLhLk4DlSzHW8clWy65PWZ2VW4dVnpw4VDTv1N4qMxKt5mNY1V3Zsc37CgRjzW6pdHWS50g05dW1W3rMF6LnLQCVCPTWY899s9XW8RJNrD8YrWSzW63GxJc92hp8tW73_vk19l_MmXW4nswLN7c2LggW55gs2G8S4KpLW3G9wsy6RD43WW2CWPJQ8NcrMjV-BdV02CRKt7W1r4F3N3Jl6dhW15V5MH8Kz38ZW7HFNWX3Ys4TmN7PPdb7H4cyTN7kJQPX2fZKGVfQq-v3RbWCNN1tLX29zvF40N8HyyLvrRwyzW7Xdz7C5vpMXqW9bVgS671ztgMW1ncYnk7-GvtHVNy5R91PdLYWVPrPyF4spW6XW3fzWzQ5_HnY4W3Clk2b2l5rf7W5pYPbN7WJ_7yW1QhWMH2tRn4CW6Wj35N2SYwy7W292RHF8qczZqW3k3pHQ2qgbY7W4lvT8D2rR3nDW8329v75xxwM1N3ChBS8kW9G-VzPbP82GcHFbW5T6-MD70f93q3ldv1 ) Affected Plugin: Royal Elementor Addons

Plugin Slug: royal-elementor-addons

Affected Versions: <= 1.3.59

CVE ID: CVE-2022-4710

CVSS Score: 6.1 (Medium)

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Researcher/s: Ramuel Gall

Fully Patched Version: 1.3.60

Unlike all of the other vulnerabilities mentioned above, reflected cross-site scripting(XSS) can be used by an attacker to completely take over a website if they can trick a logged-in administrator into performing an action, such as clicking a link, by performing actions as that administrator, such as adding a new malicious administrator, or inserting a backdoor into a plugin or theme file.

Additionally, unauthenticated users could also be targeted by this to redirect them to a malicious website or perform actions in their browsers. In this case, the data_fetch function failed to escape the wpr_ajax_search_link_target parameter used to return search results. Note that all Wordfence users, including Wordfence free users, are protected against exploits targeting this rule by the Wordfence firewall’s built-in Cross-Site Scripting protection.

Timeline

December 23, 2022 - We release a firewall rule protecting Wordfence Premium, Care, and Response customers and reach out to the plugin developer

December 26, 2023 - The plugin developer responds

December 29, 2023 - A patched version, 1.3.60, is released

January 22, 2023 - Firewall rule becomes available to Wordfence Free users

Conclusion

In today’s article, we covered a set of 11 vulnerabilities in the Royal Elementor Addons plugin. While none are critical, several can have severe consequences under certain circumstances.

The Wordfence firewall protects Wordfence Premium (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWLhLk4DlSzHW8clWy65PWZ2VW4dVnpw4VDTv1N4qMxL33pdrrV1-WJV7CgCvlVDSNsL6j-mtWW3gznDD4KsvGWVj5gw03BT56PW4HT2GL336nsxW4bhn1p64CNHPN5d3pjwlJwdVW1MkYp03yCtLjW7WJs-92vNb6gV3tf5Q17YdyGW1g3_vL9j9sykW84yNQC7t-7TSW2Bz1jT4jvTbnW6Cf9Ql1r109gN8JHxlkDMGzyW6nz9CK7GJR-fW12vhH933Q9-4W184zc43VysF2N333BC249pLMW3rgkBS7VY1MmW2TDKth8jCzdQW6Nfgwb1BDvpcN1c1_qcLlvJ5W5Qq5Xm8zkkbSW29RP0h6JMWS-39Zw1 ) , Care (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWLhLk4DlSzHW8clWy65PWZ2VW4dVnpw4VDTv1N4qMxL33pdrrV1-WJV7CgPnNW6zDBj_6H6DF3N4d_q1tp9R80N4N3RrjpS2VCN6MZlZrFML1-W5Fr-Lp7hlX65W5P475x9lG1t0W2KZTWR1T-bHTW6KgJj730sC3wW3FdXx84btd9zW4Pz4sM1tGdDVW7YbLLv4DDg2gW2hvfcM4sYNrkVGT3V12L4dzHW41wBvw4glRqfVqw1PK2gBZlGW8sD03N4kb81gW31YfKJ85QYnmW4DsMwP5LyPx0W2mQsjF13sh9kW6QKhK381dfmyM8LQFRtsBPqW6vY0K87mt4tlW24yV2N8kDhxxW2J-s-F5QDBQW25j1 ) , and Response (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWLhLk4DlSzHW8clWy65PWZ2VW4dVnpw4VDTv1N4qMxL33pdrrV1-WJV7CgSr9VskNLl1-lc3GW5cZw-H6qLChbW844Nls8xYhggN4NQf3y3y4bsN4g2722bZs5PW14xSBs2-dmq9W5dBjrY3K1WWWW7fKCXJ4k3_ZRN5JmlTGBY2HPW2fQbZF80L_ZCN7l51pKv27LLW83n-Cb3j68PTW47Z0qt80-2LHW4w1Qr47R2Lc4W6DhJ758j3GYzW15_gsn1qCcByW2CnzQv909dgPV35dGF269phZW8k4mbZ1RNkyQW48SJqK16QfF8W5pFxNK4n6QmHW96WZ2f1V0FjgW1Lfnv867WgbGW4cxkgJ3JJcz03djm1 ) users from these vulnerabilities and Wordfence Free users will receive protection on January 22, 2023 Nonetheless, we strongly recommend updating to the latest version of the plugin, which is 1.3.60 at the time of this writing, as soon as possible.

If you believe your site has been compromised as a result of this vulnerability or any other vulnerability, we offer Incident Response services via Wordfence Care. (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWLhLk4DlSzHW8clWy65PWZ2VW4dVnpw4VDTv1N4qMxL33pdrrV1-WJV7CgPnNW6zDBj_6H6DF3N4d_q1tp9R80N4N3RrjpS2VCN6MZlZrFML1-W5Fr-Lp7hlX65W5P475x9lG1t0W2KZTWR1T-bHTW6KgJj730sC3wW3FdXx84btd9zW4Pz4sM1tGdDVW7YbLLv4DDg2gW2hvfcM4sYNrkVGT3V12L4dzHW41wBvw4glRqfVqw1PK2gBZlGW8sD03N4kb81gW31YfKJ85QYnmW4DsMwP5LyPx0W2mQsjF13sh9kW6QKhK381dfmyM8LQFRtsBPqW6vY0K87mt4tlW24yV2N8kDhxxW2J-s-F5QDBQW25j1 ) If you need your site cleaned immediately, Wordfence Response (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWLhLk4DlSzHW8clWy65PWZ2VW4dVnpw4VDTv1N4qMxL33pdrrV1-WJV7CgSr9VskNLl1-lc3GW5cZw-H6qLChbW844Nls8xYhggN4NQf3y3y4bsN4g2722bZs5PW14xSBs2-dmq9W5dBjrY3K1WWWW7fKCXJ4k3_ZRN5JmlTGBY2HPW2fQbZF80L_ZCN7l51pKv27LLW83n-Cb3j68PTW47Z0qt80-2LHW4w1Qr47R2Lc4W6DhJ758j3GYzW15_gsn1qCcByW2CnzQv909dgPV35dGF269phZW8k4mbZ1RNkyQW48SJqK16QfF8W5pFxNK4n6QmHW96WZ2f1V0FjgW1Lfnv867WgbGW4cxkgJ3JJcz03djm1 ) offers the same service with 24/7/365 availability and a 1-hour response time. Both of these products include hands-on support in case you need further assistance. If you have any friends or colleagues who are using this plugin, please share this announcement with them and encourage them to update to the latest patched version of Royal Elementor Addons as soon as possible.

If you are a security researcher, you can responsibly disclose your finds to us and obtain a CVE ID (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWLhLk4DlSzHW8clWy65PWZ2VW4dVnpw4VDTv1N4qMxKN3pdr7V1-WJV7CgQNKW8drNTc6qJly3W5wQzjW4SmHS8W3CVs183FgpKDW7zd2S71TP8lmW8LM1T_5lSPF-W2RTDb-3DbRnKW2Yxbv875kBmTW7SD5Ww1QMkm8W5TQ_w71TgBVJW5J3nDq7QrL2JN744wbD4BQy2W11bz9Q5J3j5mW4ww-fR1cDNyfW56xyj21kchLQW7zHJG64wWnZBW4jjhNr8TsTNDW2ScvMR1QfHy9MW7RLTRycBtW16hj-Z5flxZyN2dHfHDm1Qz5VHbJmF1gCg2JW4frX9v1L7Q6X35JB1 ) and get your name on the Wordfence Intelligence Community Edition leaderboard (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWLhLk4DlSzHW8clWy65PWZ2VW4dVnpw4VDTv1N4qMxLm3pdrLV1-WJV7CgXzBV2k3g58DgbRTW2DM3hY1qb-rSVVzj4c4RGFntN7SxGf_TszDFW8QsMLm4209fkW19vVrG5hhzHJVzJ6V154DPzzW1b02W97cgnQFW5QNtkZ7DMC6GW34MZDF6jMnwBW24MvPN80_qV_W8cVS9P1Q3v1ZW5FQDWT398BWNN2d0bBTMMYtxW3bQ5q17FLbmYV4DgG35znby9W3nxdWl4PYy6QW1FBGzD7nkX3dW4hlwkj2vzpP_W4zpLwC5CRv1JW5Yqrbt624LZrW7ccPYH27fY95W6rgvdt3kzqs-N18mdQz2frfFW8TjvTv9bkybSN7RFQz1fqbpZ32wk1 ) .

The Full Product Lineup:

wf-stacked-free-1 (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWLhLk4DlSzHW8clWy65PWZ2VW4dVnpw4VDTv1N4qMxKN3pdr7V1-WJV7CgSP8W6hhjHL2jYR9RV-nxGs8yrJD4N15G9PFS2r5ZN6YXFjpFDr5NW707DM040cfndW6WvqjC4g250pW4lRjzl6Lb3wmW3TcFV21w2GP1W5dKYnS6pWK12W2WN63T7T945LW37jF5d5r0lW9W77VZsp1S3-FdW6mXKcK9lfqVfW8Nj_V09dyk-bW1yztfr6M-n7cW7gnLWb4PnfvTW4WGwV471L6ntW8r5cFJ3sqmpqVt1k0k6WzmDnW33pX-x63_G0HW1_NgLD4KPTmCW4Hc3RQ5hNHj63cqF1 )

wf-stacked-premium-1 (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWLhLk4DlSzHW8clWy65PWZ2VW4dVnpw4VDTv1N4qMxL33pdrrV1-WJV7CgX7NW7LgHjV5nlrK6N1_DF6N5w54WW4q6mtW2rPsMwW30G2SP3LpLhpW63WdTx5qncRYW4qgh5g8vn327W4pxdK-2vqh0-W73M5sJ79mtYMW6KNYpG7fTgZXW9chlKq25xdWjW6ftNKG7dCYKFVGGjsP7xdsjRW6YLnP_3B290tW38d5bg8tzCYWW88lv2v6fFv2MW5nVlT-1rvZV_W7tLDSw4nShrdW1wJ0g77rmSZBW9bgvcx582v9wW646RC276Z96MW8bjdvn7NxP-0W31GVZB2cbHPQW4SPwlY6v3frLW6Gw43Y1bWNzN35hd1 )

wf-stacked-care-3 (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWLhLk4DlSzHW8clWy65PWZ2VW4dVnpw4VDTv1N4qMxKN3pdr7V1-WJV7CgL4-W6wYKw56f6HwgW1gkCXJ9lv4FMN1xR-YpjZJPLW1qmjpP2-RC1vW2G6N6D2vmRcTW6DZ_0v3Qtc-nW89YwV51XtY5hW1F1wZv72gWh0W4JQVBv6v0n9cW68fg2b16NSDgTbwJS4h5S4zN5nq1p7gP7lCW1PPqgq8wMH6cVGpftZ1lFzL0W9bc7lH21HvwgW21rwms4WczVzN92Cj09-4-CrW3jpt3Z3TqQVNW49pDVX2FNx9RW5Y2qdJ7j9ZvvW5cfHbW2w6fJzW2T1NlK1wfQS43gtV1 )

wf-stacked-response-2 (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWLhLk4DlSzHW8clWy65PWZ2VW4dVnpw4VDTv1N4qMxL33pdrrV1-WJV7CgVjvVMB7B360Dw0RW2tdRJG9gkXcjW73yX_V1D0-_tW7kFm8Q63qdlSN3Npr5G1R36VN2dW6VF4jn0VW3hb3D33XMWLMW7G_dLl3YSNQpW9lx6Fb8bddYQVXm-Z01zR26bW68K0T41H6KJdW3PHR9-5Y-9B-W3H3YYK5hYsTZN9jv8v0DzNyDW5xD5n588Gg9cN5scfh8r6CSHW19RS5s7MmJrXN6tBjb1pFqvCW1Yq8Gt6cDx7nW68dVmc1Sd701W2Xr2rn29cD8sW2p_vXD8R-l_BW3cCQph54l_8-W90qwG11s4bvD3fbP1 )

wf-stacked-intelligence (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWLhLk4DlSzHW8clWy65PWZ2VW4dVnpw4VDTv1N4qMxL33pdrrV1-WJV7CgFDmV9vzvY62Pw6dW5-pZwS5qjGrNW2-2Ysr1Zn85bW2g6rMf2XCxBLW8LNX9X84WnkFW3SpZH52sJSLxW6b9DSD8g4LRtW8CqxDL2BfPjZN8h8jsR9BCPwN5ZYSNLTw3q1W75N6936tYF2TW4zf3KS8hkXQlW8YHmtz95JKtvW8YCpXw27DKwtW4kxtJ36xj-XkN4DrjTj7n390W95dNg04jCs5XW5R6bTy7RHd43N8cdnN5pXMHjW96tVf2865s_JW4cRqDr6Tg0SHW12NkX96Ls5Y8W5tMcHz8pqxgCW1p023F8gQXRm3dBS1 )

logo-defiant (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWLhLk4DlSzHW8clWy65PWZ2VW4dVnpw4VDTv1N4qMxKt3pdqSV1-WJV7CgLBKN2G6Lkt-LQtZW6W5Cps9kFlP3W1G3jRc2_cbxKVv1Psk8ZTdYDW3cLBZM42t0vGN75NZFbR7d7vW8RBd7D7jp1RqW7rdgM91-y2HhW5MzztP4K8dTMVZkM7H6bHftZW13rK0Q1hQbJzW2vv6NC8Z45rHW63QFsw5Zgq1nW5lB8Mn3RTT38W2Cj6ZF6dYPpqN3GbYqzH1yJGW87l68x1zCCzkW3pvmXy1FCjn-W2sDrV_7R0C3vW54nFCn3q80y63cpc1 )

Defiant, Inc., 1700 Westlake Ave N STE 200, Seattle, WA 98109, United States

Unsubscribe (https://email.wordfence.com/hs/manage-preferences/unsubscribe-all?languagePreference=en&d=Vn9bTK892TtnVsxx1M3JN_XyW41Rcn-4h29fmN6J4V3XmWFg8W5cRYSZ5pGwSXV25zR18-pwmNN6zprfVXh8g7N8pwwvYXk_7QVbwgS54kVkn5W8JYK9x3lZR9Vw3xkQ0Y1mb2&v=3&_hsenc=p2ANqtz-99aVSyCbjGKXS-oYzThY2gNSyxVHB4IBxeC-sx4M7vBQN4ND4luj0orQOuktlhBX_txcHUJ6Ny324ld1Rz50i78jsjlQ&_hsmi=241104581 )

Manage preferences (https://email.wordfence.com/hs/manage-preferences/unsubscribe?languagePreference=en&d=Vn9bTK892TtnVsxx1M3JN_XyW41Rcn-4h29fmN6J4V3XmWFg8W5cRYSZ5pGwSXV25zR18-pwmNN6zprfVXh8g7N8pwwvYXk_7QVbwgS54kVkn5W8JYK9x3lZR9Vw3xkQ0Y1mb2&v=3&_hsenc=p2ANqtz-99aVSyCbjGKXS-oYzThY2gNSyxVHB4IBxeC-sx4M7vBQN4ND4luj0orQOuktlhBX_txcHUJ6Ny324ld1Rz50i78jsjlQ&_hsmi=241104581 )

You're receiving this email because you signed up to the Wordfence WordPress security mailing list.
Received on Tue Jan 10 2023 - 18:27:32 CET

This archive was generated by hypermail 2.3.0 : Tue Jan 10 2023 - 18:32:26 CET