Skip to main content

CVE-2023-6984: CWE-352 Cross-Site Request Forgery (CSRF) in ideaboxcreations PowerPack Addons for Elementor (Free Widgets, Extensions and Templates)

Medium
VulnerabilityCVE-2023-6984cvecve-2023-6984cwe-352
Published: Wed Jan 03 2024 (01/03/2024, 08:29:49 UTC)
Source: CVE Database V5
Vendor/Project: ideaboxcreations
Product: PowerPack Addons for Elementor (Free Widgets, Extensions and Templates)

Description

The PowerPack Addons for Elementor (Free Widgets, Extensions and Templates) plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.7.13. This is due to missing or incorrect nonce validation in the powerpack-lite-for-elementor/classes/class-pp-admin-settings.php file. This makes it possible for unauthenticated attackers to modify and reset plugin settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

AI-Powered Analysis

AILast updated: 07/04/2025, 01:56:39 UTC

Technical Analysis

CVE-2023-6984 is a Cross-Site Request Forgery (CSRF) vulnerability affecting the PowerPack Addons for Elementor plugin for WordPress, specifically all versions up to and including 2.7.13. This plugin provides free widgets, extensions, and templates to enhance the Elementor page builder. The vulnerability arises from missing or incorrect nonce validation in the file powerpack-lite-for-elementor/classes/class-pp-admin-settings.php, which is responsible for handling administrative settings. Due to this flaw, an unauthenticated attacker can craft a malicious request that, if an authenticated site administrator is tricked into clicking (for example, via a link in an email or on a malicious website), can modify or reset the plugin’s settings without the administrator’s consent. The CVSS 3.1 base score is 5.3 (medium severity), reflecting that the attack vector is network-based, requires no privileges or user interaction, and impacts integrity but not confidentiality or availability. The vulnerability does not require authentication, making it more accessible to attackers, but it does require user interaction in the form of the administrator clicking a crafted link. No known exploits are currently reported in the wild, and no patches have been linked yet. This vulnerability is categorized under CWE-352, which is a common web security issue where state-changing requests lack proper anti-CSRF protections, such as nonce tokens or similar mechanisms. Given the widespread use of WordPress and Elementor in website development, this vulnerability could be leveraged to alter site configurations, potentially leading to further compromise or disruption of site functionality.

Potential Impact

For European organizations, this vulnerability poses a moderate risk primarily to websites using WordPress with the PowerPack Addons for Elementor plugin. The impact includes unauthorized modification or resetting of plugin settings, which could degrade website functionality, disrupt user experience, or open avenues for further attacks if settings related to security or content delivery are altered. While it does not directly expose confidential data or cause denial of service, the integrity compromise could undermine trust in affected websites, especially those handling sensitive customer interactions or e-commerce. Organizations in sectors such as e-commerce, government, education, and media that rely on WordPress for their web presence are particularly at risk. Additionally, since the attack requires tricking an administrator, social engineering campaigns targeting site admins could increase the likelihood of exploitation. The lack of authentication requirement for the attacker broadens the threat landscape, making it easier for remote adversaries to attempt exploitation. However, the absence of known exploits in the wild currently limits immediate widespread impact.

Mitigation Recommendations

European organizations should take proactive steps to mitigate this vulnerability beyond generic advice. First, they should immediately verify if their WordPress installations use the PowerPack Addons for Elementor plugin and identify the version in use. If affected (version 2.7.13 or earlier), they should monitor the plugin vendor’s channels for official patches or updates and apply them promptly once available. In the interim, administrators should implement strict access controls to limit who can access WordPress admin interfaces, including enforcing strong authentication mechanisms such as multi-factor authentication (MFA) to reduce the risk of compromised admin accounts. Additionally, organizations should educate site administrators about the risks of clicking unsolicited links, especially those received via email or messaging platforms, to reduce the likelihood of social engineering exploitation. Web Application Firewalls (WAFs) can be configured to detect and block suspicious requests that attempt to modify plugin settings without valid nonces. Finally, regular backups of website configurations and content should be maintained to enable quick restoration if unauthorized changes occur.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2023-12-20T08:38:40.686Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 683f0dc2182aa0cae27ff3f1

Added to database: 6/3/2025, 2:59:14 PM

Last enriched: 7/4/2025, 1:56:39 AM

Last updated: 7/26/2025, 1:53:24 PM

Views: 8

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats