SB2023012022 - Multiple vulnerabilities in Royal Elementor Addons plugin for WordPress



SB2023012022 - Multiple vulnerabilities in Royal Elementor Addons plugin for WordPress

Published: January 20, 2023

Security Bulletin ID SB2023012022
Severity
Medium
Patch available
YES
Number of vulnerabilities 11
Exploitation vector Remote access
Highest impact Data manipulation

Breakdown by Severity

Medium 27% Low 73%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 11 secuirty vulnerabilities.


1) Improper access control (CVE-ID: CVE-2022-4702)

The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to improper access restrictions in the wpr_fix_royal_compatibility AJAX action. A remote user can deactivate every plugin on the site unless it is part of an extremely limited hardcoded selection.


2) Improper access control (CVE-ID: CVE-2022-4708)

The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to improper access restrictions wpr_save_template_conditions AJAX action. A remote user can enable and modify Mega Menu settings for any menu item.


3) Improper access control (CVE-ID: CVE-2022-4709)

The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to improper access restrictions in the wpr_import_library_template AJAX action. A remote user can enable and modify Mega Menu settings for any menu item.


4) Cross-site scripting (CVE-ID: CVE-2022-4710)

The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.

The vulnerability exists due to insufficient sanitization of user-supplied data in the wpr_ajax_search_link_target parameter in the data_fetch function. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.

Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.


5) Improper access control (CVE-ID: CVE-2022-4711)

The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to improper access restrictions in the wpr_save_mega_menu_settings AJAX action. A remote user can enable and modify Mega Menu settings for any menu item.


6) Improper access control (CVE-ID: CVE-2022-4704)

The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to improper access restrictions in the wpr_import_templates_kit AJAX action. A remote user can import preset site configuration templates including images and settings.


7) Improper access control (CVE-ID: CVE-2022-4703)

The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to improper access restrictions in the wpr_reset_previous_import AJAX action. A remote user can reset previously imported data.


8) Improper access control (CVE-ID: CVE-2022-4705)

The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to improper access restrictions in the wpr_final_settings_setup AJAX action. A remote user can finalize activation of preset site configuration templates.


9) Cross-site request forgery (CVE-ID: CVE-2022-4707)

The vulnerability allows a remote attacker to perform cross-site request forgery attacks.

The vulnerability exists due to insufficient validation of the HTTP request origin in the wpr_create_mega_menu_template AJAX function. A remote attacker can trick the victim to visit a specially crafted web page and perform arbitrary actions on behalf of the victim on the vulnerable website.


10) Improper access control (CVE-ID: CVE-2022-4700)

The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to improper access restrictions in the wpr_activate_required_theme AJAX action. A remote user can activate the royal-elementor-kit theme.


11) Improper access control (CVE-ID: CVE-2022-4701)

The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to improper access restrictions in the wpr_activate_required_plugins AJAX action. A remote user can activate the contact-form-7, media-library-assistant, or woocommerce plugins if they are installed on the site.


Remediation

Install update from vendor's website.

References