The Elementor Addon Elements plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the modal popup widget's effect setting in all versions up to, and including, 1.12.12 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Metrics
Affected Vendors & Products
References
History
Fri, 17 Jan 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Webtechstreet
Webtechstreet elementor Addon Elements |
|
Weaknesses | CWE-79 | |
CPEs | cpe:2.3:a:webtechstreet:elementor_addon_elements:*:*:*:*:*:wordpress:*:* | |
Vendors & Products |
Webtechstreet
Webtechstreet elementor Addon Elements |

Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2024-08-01T18:40:21.223Z
Reserved: 2024-02-09T20:55:32.314Z
Link: CVE-2024-1422

Updated: 2024-08-01T18:40:21.223Z

Status : Analyzed
Published: 2024-03-13T16:15:22.457
Modified: 2025-01-17T19:56:49.607
Link: CVE-2024-1422

No data.