First published: Mon Apr 05 2021(Updated: )
In the Elementor Website Builder WordPress plugin before 3.1.4, the column element (includes/elements/column.php) accepts an ‘html_tag’ parameter. Although the element control lists a fixed set of possible html tags, it is possible for a user with Contributor or above permissions to send a modified ‘save_builder’ request containing JavaScript in the ‘html_tag’ parameter, which is not filtered and is output without escaping. This JavaScript will then be executed when the saved page is viewed or previewed.
Credit: contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
Elementor Website Builder | <3.1.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-24201 is a vulnerability in the Elementor Website Builder WordPress plugin before version 3.1.4 that allows a user with Contributor or above permissions to send a modified 'html_tag' parameter to the column element, potentially leading to cross-site scripting (XSS) attacks.
CVE-2021-24201 has a severity rating of medium with a CVSS score of 5.4.
CVE-2021-24201 affects the column element (includes/elements/column.php) in the Elementor Website Builder WordPress plugin before version 3.1.4.
A user with Contributor or above permissions can exploit CVE-2021-24201 by sending a modified 'html_tag' parameter to the column element, potentially allowing for cross-site scripting (XSS) attacks.
Yes, updating the Elementor Website Builder plugin to version 3.1.4 or newer will fix the CVE-2021-24201 vulnerability.