CVE-2023-6984: CWE-352 Cross-Site Request Forgery (CSRF) in ideaboxcreations PowerPack Addons for Elementor (Free Widgets, Extensions and Templates)
The PowerPack Addons for Elementor (Free Widgets, Extensions and Templates) plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.7.13. This is due to missing or incorrect nonce validation in the powerpack-lite-for-elementor/classes/class-pp-admin-settings.php file. This makes it possible for unauthenticated attackers to modify and reset plugin settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
AI Analysis
Technical Summary
CVE-2023-6984 is a Cross-Site Request Forgery (CSRF) vulnerability affecting the PowerPack Addons for Elementor plugin for WordPress, specifically all versions up to and including 2.7.13. This plugin provides free widgets, extensions, and templates to enhance the Elementor page builder. The vulnerability arises from missing or incorrect nonce validation in the file powerpack-lite-for-elementor/classes/class-pp-admin-settings.php, which is responsible for handling administrative settings. Due to this flaw, an unauthenticated attacker can craft a malicious request that, if an authenticated site administrator is tricked into clicking (for example, via a link in an email or on a malicious website), can modify or reset the plugin’s settings without the administrator’s consent. The CVSS 3.1 base score is 5.3 (medium severity), reflecting that the attack vector is network-based, requires no privileges or user interaction, and impacts integrity but not confidentiality or availability. The vulnerability does not require authentication, making it more accessible to attackers, but it does require user interaction in the form of the administrator clicking a crafted link. No known exploits are currently reported in the wild, and no patches have been linked yet. This vulnerability is categorized under CWE-352, which is a common web security issue where state-changing requests lack proper anti-CSRF protections, such as nonce tokens or similar mechanisms. Given the widespread use of WordPress and Elementor in website development, this vulnerability could be leveraged to alter site configurations, potentially leading to further compromise or disruption of site functionality.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to websites using WordPress with the PowerPack Addons for Elementor plugin. The impact includes unauthorized modification or resetting of plugin settings, which could degrade website functionality, disrupt user experience, or open avenues for further attacks if settings related to security or content delivery are altered. While it does not directly expose confidential data or cause denial of service, the integrity compromise could undermine trust in affected websites, especially those handling sensitive customer interactions or e-commerce. Organizations in sectors such as e-commerce, government, education, and media that rely on WordPress for their web presence are particularly at risk. Additionally, since the attack requires tricking an administrator, social engineering campaigns targeting site admins could increase the likelihood of exploitation. The lack of authentication requirement for the attacker broadens the threat landscape, making it easier for remote adversaries to attempt exploitation. However, the absence of known exploits in the wild currently limits immediate widespread impact.
Mitigation Recommendations
European organizations should take proactive steps to mitigate this vulnerability beyond generic advice. First, they should immediately verify if their WordPress installations use the PowerPack Addons for Elementor plugin and identify the version in use. If affected (version 2.7.13 or earlier), they should monitor the plugin vendor’s channels for official patches or updates and apply them promptly once available. In the interim, administrators should implement strict access controls to limit who can access WordPress admin interfaces, including enforcing strong authentication mechanisms such as multi-factor authentication (MFA) to reduce the risk of compromised admin accounts. Additionally, organizations should educate site administrators about the risks of clicking unsolicited links, especially those received via email or messaging platforms, to reduce the likelihood of social engineering exploitation. Web Application Firewalls (WAFs) can be configured to detect and block suspicious requests that attempt to modify plugin settings without valid nonces. Finally, regular backups of website configurations and content should be maintained to enable quick restoration if unauthorized changes occur.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2023-6984: CWE-352 Cross-Site Request Forgery (CSRF) in ideaboxcreations PowerPack Addons for Elementor (Free Widgets, Extensions and Templates)
Description
The PowerPack Addons for Elementor (Free Widgets, Extensions and Templates) plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.7.13. This is due to missing or incorrect nonce validation in the powerpack-lite-for-elementor/classes/class-pp-admin-settings.php file. This makes it possible for unauthenticated attackers to modify and reset plugin settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
AI-Powered Analysis
Technical Analysis
CVE-2023-6984 is a Cross-Site Request Forgery (CSRF) vulnerability affecting the PowerPack Addons for Elementor plugin for WordPress, specifically all versions up to and including 2.7.13. This plugin provides free widgets, extensions, and templates to enhance the Elementor page builder. The vulnerability arises from missing or incorrect nonce validation in the file powerpack-lite-for-elementor/classes/class-pp-admin-settings.php, which is responsible for handling administrative settings. Due to this flaw, an unauthenticated attacker can craft a malicious request that, if an authenticated site administrator is tricked into clicking (for example, via a link in an email or on a malicious website), can modify or reset the plugin’s settings without the administrator’s consent. The CVSS 3.1 base score is 5.3 (medium severity), reflecting that the attack vector is network-based, requires no privileges or user interaction, and impacts integrity but not confidentiality or availability. The vulnerability does not require authentication, making it more accessible to attackers, but it does require user interaction in the form of the administrator clicking a crafted link. No known exploits are currently reported in the wild, and no patches have been linked yet. This vulnerability is categorized under CWE-352, which is a common web security issue where state-changing requests lack proper anti-CSRF protections, such as nonce tokens or similar mechanisms. Given the widespread use of WordPress and Elementor in website development, this vulnerability could be leveraged to alter site configurations, potentially leading to further compromise or disruption of site functionality.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to websites using WordPress with the PowerPack Addons for Elementor plugin. The impact includes unauthorized modification or resetting of plugin settings, which could degrade website functionality, disrupt user experience, or open avenues for further attacks if settings related to security or content delivery are altered. While it does not directly expose confidential data or cause denial of service, the integrity compromise could undermine trust in affected websites, especially those handling sensitive customer interactions or e-commerce. Organizations in sectors such as e-commerce, government, education, and media that rely on WordPress for their web presence are particularly at risk. Additionally, since the attack requires tricking an administrator, social engineering campaigns targeting site admins could increase the likelihood of exploitation. The lack of authentication requirement for the attacker broadens the threat landscape, making it easier for remote adversaries to attempt exploitation. However, the absence of known exploits in the wild currently limits immediate widespread impact.
Mitigation Recommendations
European organizations should take proactive steps to mitigate this vulnerability beyond generic advice. First, they should immediately verify if their WordPress installations use the PowerPack Addons for Elementor plugin and identify the version in use. If affected (version 2.7.13 or earlier), they should monitor the plugin vendor’s channels for official patches or updates and apply them promptly once available. In the interim, administrators should implement strict access controls to limit who can access WordPress admin interfaces, including enforcing strong authentication mechanisms such as multi-factor authentication (MFA) to reduce the risk of compromised admin accounts. Additionally, organizations should educate site administrators about the risks of clicking unsolicited links, especially those received via email or messaging platforms, to reduce the likelihood of social engineering exploitation. Web Application Firewalls (WAFs) can be configured to detect and block suspicious requests that attempt to modify plugin settings without valid nonces. Finally, regular backups of website configurations and content should be maintained to enable quick restoration if unauthorized changes occur.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2023-12-20T08:38:40.686Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 683f0dc2182aa0cae27ff3f1
Added to database: 6/3/2025, 2:59:14 PM
Last enriched: 7/4/2025, 1:56:39 AM
Last updated: 7/26/2025, 1:53:24 PM
Views: 8
Related Threats
CVE-2025-43735: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Liferay Portal
MediumCVE-2025-40770: CWE-300: Channel Accessible by Non-Endpoint in Siemens SINEC Traffic Analyzer
HighCVE-2025-40769: CWE-1164: Irrelevant Code in Siemens SINEC Traffic Analyzer
HighCVE-2025-40768: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in Siemens SINEC Traffic Analyzer
HighCVE-2025-40767: CWE-250: Execution with Unnecessary Privileges in Siemens SINEC Traffic Analyzer
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.