SB2023012022 - Multiple vulnerabilities in Royal Elementor Addons plugin for WordPress
Published: January 20, 2023
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 11 secuirty vulnerabilities.
1) Improper access control (CVE-ID: CVE-2022-4702)
The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to improper access restrictions in the wpr_fix_royal_compatibility AJAX action. A remote user can deactivate every plugin on the site unless it is part of an extremely limited hardcoded selection.
2) Improper access control (CVE-ID: CVE-2022-4708)
The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to improper access restrictions wpr_save_template_conditions AJAX action. A remote user can enable and modify Mega Menu settings for any menu item.
3) Improper access control (CVE-ID: CVE-2022-4709)
The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to improper access restrictions in the wpr_import_library_template AJAX action. A remote user can enable and modify Mega Menu settings for any menu item.
4) Cross-site scripting (CVE-ID: CVE-2022-4710)
The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to insufficient sanitization of user-supplied data in the wpr_ajax_search_link_target parameter in the data_fetch function. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
5) Improper access control (CVE-ID: CVE-2022-4711)
The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to improper access restrictions in the wpr_save_mega_menu_settings AJAX action. A remote user can enable and modify Mega Menu settings for any menu item.
6) Improper access control (CVE-ID: CVE-2022-4704)
The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to improper access restrictions in the wpr_import_templates_kit AJAX action. A remote user can import preset site configuration templates including images and settings.
7) Improper access control (CVE-ID: CVE-2022-4703)
The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to improper access restrictions in the wpr_reset_previous_import AJAX action. A remote user can reset previously imported data.
8) Improper access control (CVE-ID: CVE-2022-4705)
The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to improper access restrictions in the wpr_final_settings_setup AJAX action. A remote user can finalize activation of preset site configuration templates.
9) Cross-site request forgery (CVE-ID: CVE-2022-4707)
The vulnerability allows a remote attacker to perform cross-site request forgery attacks.
The vulnerability exists due to insufficient validation of the HTTP request origin in the wpr_create_mega_menu_template AJAX function. A remote attacker can trick the victim to visit a specially crafted web page and perform arbitrary actions on behalf of the victim on the vulnerable website.
10) Improper access control (CVE-ID: CVE-2022-4700)
The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to improper access restrictions in the wpr_activate_required_theme AJAX action. A remote user can activate the royal-elementor-kit theme.
11) Improper access control (CVE-ID: CVE-2022-4701)
The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to improper access restrictions in the wpr_activate_required_plugins AJAX action. A remote user can activate the contact-form-7, media-library-assistant, or woocommerce plugins if they are installed on the site.
Remediation
Install update from vendor's website.
References
- https://www.wordfence.com/blog/2023/01/eleven-vulnerabilities-patched-in-royal-elementor-addons/
- https://plugins.trac.wordpress.org/browser/royal-elementor-addons/trunk/admin/templates-kit.php?rev=2833046
- https://www.wordfence.com/threat-intel/vulnerabilities/id/cb47b6cc-87e4-4d29-bbc7-6d7552bc3943
- https://plugins.trac.wordpress.org/browser/royal-elementor-addons/trunk/admin/includes/wpr-templates-actions.php?rev=2834217
- https://www.wordfence.com/threat-intel/vulnerabilities/id/b3e12653-ddfe-4e02-9d9e-0263b9f71def
- https://www.wordfence.com/threat-intel/vulnerabilities/id/fa530112-a7cd-4c54-aa87-9e7337d01557
- https://www.wordfence.com/threat-intel/vulnerabilities/id/ac6c6ce4-9944-4c8e-89aa-6a2e870ef205
- https://plugins.trac.wordpress.org/browser/royal-elementor-addons/trunk/classes/wpr-ajax-search.php?rev=2809656
- https://www.wordfence.com/threat-intel/vulnerabilities/id/c23e9810-40ea-43e2-9292-f05f300a7ddf
- https://plugins.trac.wordpress.org/browser/royal-elementor-addons/trunk/admin/mega-menu.php?rev=2809656
- https://www.wordfence.com/threat-intel/vulnerabilities/id/64cce528-0ad0-45ec-a8f6-e8791b0bece0
- https://www.wordfence.com/threat-intel/vulnerabilities/id/62a5c796-1c14-4cb1-9f21-340b40e418df
- https://www.wordfence.com/threat-intel/vulnerabilities/id/0a941aef-85f6-4719-b6ab-ace77a03e93e
- https://www.wordfence.com/threat-intel/vulnerabilities/id/55db7d81-7ffb-49da-b64e-23e892bddc57
- https://www.wordfence.com/threat-intel/vulnerabilities/id/cdd464ad-24bc-4922-8bfa-ac42fbe60b52
- https://www.wordfence.com/threat-intel/vulnerabilities/id/55f7e39b-e7a5-462b-b1e4-c3d92038f17e