CVE-2023-6984: CWE-352 Cross-Site Request Forgery (CSRF) in ideaboxcreations PowerPack Addons for Elementor (Free Widgets, Extensions and Templates)
The PowerPack Addons for Elementor (Free Widgets, Extensions and Templates) plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.7.13. This is due to missing or incorrect nonce validation in the powerpack-lite-for-elementor/classes/class-pp-admin-settings.php file. This makes it possible for unauthenticated attackers to modify and reset plugin settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
AI Analysis
Technical Summary
CVE-2023-6984 is a Cross-Site Request Forgery (CSRF) vulnerability affecting the PowerPack Addons for Elementor plugin for WordPress, specifically all versions up to and including 2.7.13. This plugin provides free widgets, extensions, and templates to enhance the Elementor page builder. The vulnerability arises from missing or incorrect nonce validation in the file powerpack-lite-for-elementor/classes/class-pp-admin-settings.php, which is responsible for handling administrative settings. Due to this flaw, an unauthenticated attacker can craft a malicious request that, if an authenticated site administrator is tricked into clicking (for example, via a link in an email or on a malicious website), can modify or reset the plugin’s settings without the administrator’s consent. The CVSS 3.1 base score is 5.3 (medium severity), reflecting that the attack vector is network-based, requires no privileges or user interaction, and impacts integrity but not confidentiality or availability. The vulnerability does not require authentication, making it more accessible to attackers, but it does require user interaction in the form of the administrator clicking a crafted link. No known exploits are currently reported in the wild, and no patches have been linked yet. This vulnerability is categorized under CWE-352, which is a common web security issue where state-changing requests lack proper anti-CSRF protections, such as nonce tokens or similar mechanisms. Given the widespread use of WordPress and Elementor in website development, this vulnerability could be leveraged to alter site configurations, potentially leading to further compromise or disruption of site functionality.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to websites using WordPress with the PowerPack Addons for Elementor plugin. The impact includes unauthorized modification or resetting of plugin settings, which could degrade website functionality, disrupt user experience, or open avenues for further attacks if settings related to security or content delivery are altered. While it does not directly expose confidential data or cause denial of service, the integrity compromise could undermine trust in affected websites, especially those handling sensitive customer interactions or e-commerce. Organizations in sectors such as e-commerce, government, education, and media that rely on WordPress for their web presence are particularly at risk. Additionally, since the attack requires tricking an administrator, social engineering campaigns targeting site admins could increase the likelihood of exploitation. The lack of authentication requirement for the attacker broadens the threat landscape, making it easier for remote adversaries to attempt exploitation. However, the absence of known exploits in the wild currently limits immediate widespread impact.
Mitigation Recommendations
European organizations should take proactive steps to mitigate this vulnerability beyond generic advice. First, they should immediately verify if their WordPress installations use the PowerPack Addons for Elementor plugin and identify the version in use. If affected (version 2.7.13 or earlier), they should monitor the plugin vendor’s channels for official patches or updates and apply them promptly once available. In the interim, administrators should implement strict access controls to limit who can access WordPress admin interfaces, including enforcing strong authentication mechanisms such as multi-factor authentication (MFA) to reduce the risk of compromised admin accounts. Additionally, organizations should educate site administrators about the risks of clicking unsolicited links, especially those received via email or messaging platforms, to reduce the likelihood of social engineering exploitation. Web Application Firewalls (WAFs) can be configured to detect and block suspicious requests that attempt to modify plugin settings without valid nonces. Finally, regular backups of website configurations and content should be maintained to enable quick restoration if unauthorized changes occur.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2023-6984: CWE-352 Cross-Site Request Forgery (CSRF) in ideaboxcreations PowerPack Addons for Elementor (Free Widgets, Extensions and Templates)
Description
The PowerPack Addons for Elementor (Free Widgets, Extensions and Templates) plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.7.13. This is due to missing or incorrect nonce validation in the powerpack-lite-for-elementor/classes/class-pp-admin-settings.php file. This makes it possible for unauthenticated attackers to modify and reset plugin settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
AI-Powered Analysis
Technical Analysis
CVE-2023-6984 is a Cross-Site Request Forgery (CSRF) vulnerability affecting the PowerPack Addons for Elementor plugin for WordPress, specifically all versions up to and including 2.7.13. This plugin provides free widgets, extensions, and templates to enhance the Elementor page builder. The vulnerability arises from missing or incorrect nonce validation in the file powerpack-lite-for-elementor/classes/class-pp-admin-settings.php, which is responsible for handling administrative settings. Due to this flaw, an unauthenticated attacker can craft a malicious request that, if an authenticated site administrator is tricked into clicking (for example, via a link in an email or on a malicious website), can modify or reset the plugin’s settings without the administrator’s consent. The CVSS 3.1 base score is 5.3 (medium severity), reflecting that the attack vector is network-based, requires no privileges or user interaction, and impacts integrity but not confidentiality or availability. The vulnerability does not require authentication, making it more accessible to attackers, but it does require user interaction in the form of the administrator clicking a crafted link. No known exploits are currently reported in the wild, and no patches have been linked yet. This vulnerability is categorized under CWE-352, which is a common web security issue where state-changing requests lack proper anti-CSRF protections, such as nonce tokens or similar mechanisms. Given the widespread use of WordPress and Elementor in website development, this vulnerability could be leveraged to alter site configurations, potentially leading to further compromise or disruption of site functionality.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to websites using WordPress with the PowerPack Addons for Elementor plugin. The impact includes unauthorized modification or resetting of plugin settings, which could degrade website functionality, disrupt user experience, or open avenues for further attacks if settings related to security or content delivery are altered. While it does not directly expose confidential data or cause denial of service, the integrity compromise could undermine trust in affected websites, especially those handling sensitive customer interactions or e-commerce. Organizations in sectors such as e-commerce, government, education, and media that rely on WordPress for their web presence are particularly at risk. Additionally, since the attack requires tricking an administrator, social engineering campaigns targeting site admins could increase the likelihood of exploitation. The lack of authentication requirement for the attacker broadens the threat landscape, making it easier for remote adversaries to attempt exploitation. However, the absence of known exploits in the wild currently limits immediate widespread impact.
Mitigation Recommendations
European organizations should take proactive steps to mitigate this vulnerability beyond generic advice. First, they should immediately verify if their WordPress installations use the PowerPack Addons for Elementor plugin and identify the version in use. If affected (version 2.7.13 or earlier), they should monitor the plugin vendor’s channels for official patches or updates and apply them promptly once available. In the interim, administrators should implement strict access controls to limit who can access WordPress admin interfaces, including enforcing strong authentication mechanisms such as multi-factor authentication (MFA) to reduce the risk of compromised admin accounts. Additionally, organizations should educate site administrators about the risks of clicking unsolicited links, especially those received via email or messaging platforms, to reduce the likelihood of social engineering exploitation. Web Application Firewalls (WAFs) can be configured to detect and block suspicious requests that attempt to modify plugin settings without valid nonces. Finally, regular backups of website configurations and content should be maintained to enable quick restoration if unauthorized changes occur.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2023-12-20T08:38:40.686Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 683f0dc2182aa0cae27ff3f1
Added to database: 6/3/2025, 2:59:14 PM
Last enriched: 7/4/2025, 1:56:39 AM
Last updated: 11/29/2025, 6:50:20 AM
Views: 30
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-65892: n/a
UnknownCVE-2025-65540: n/a
UnknownCVE-2025-66221: CWE-67: Improper Handling of Windows Device Names in pallets werkzeug
MediumCVE-2025-53939: CWE-20: Improper Input Validation in kiteworks security-advisories
MediumCVE-2025-53900: CWE-267: Privilege Defined With Unsafe Actions in kiteworks security-advisories
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.