The Royal Elementor Addons plugin for WordPress is vulnerable to Reflected Cross-Site Scripting in versions up to, and including, 1.3.59, due to due to insufficient input sanitization and output escaping of the 'wpr_ajax_search_link_target' parameter in the 'data_fetch' function. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. This is occurring because 'sanitize_text_field' is insufficient to prevent attribute-based Cross-Site Scripting
History

Mon, 13 Jan 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2025-01-13T17:13:39.947Z

Reserved: 2022-12-23T18:52:34.443Z

Link: CVE-2022-4710

cve-icon Vulnrichment

Updated: 2024-08-03T01:48:40.429Z

cve-icon NVD

Status : Modified

Published: 2023-01-10T17:15:11.857

Modified: 2024-11-21T07:35:46.840

Link: CVE-2022-4710

cve-icon Redhat

No data.