First published: Tue Jan 10 2023(Updated: )
The Royal Elementor Addons plugin for WordPress is vulnerable to Reflected Cross-Site Scripting in versions up to, and including, 1.3.59, due to due to insufficient input sanitization and output escaping of the 'wpr_ajax_search_link_target' parameter in the 'data_fetch' function. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. This is occurring because 'sanitize_text_field' is insufficient to prevent attribute-based Cross-Site Scripting
Credit: security@wordfence.com security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Royal Elementor Addons | <=1.3.59 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2022-4710.
The severity of CVE-2022-4710 is medium.
The affected software for CVE-2022-4710 is the Royal Elementor Addons plugin for WordPress up to and including version 1.3.59.
CVE-2022-4710 is caused by insufficient input sanitization and output escaping of the 'wpr_ajax_search_link_target' parameter in the 'data_fetch' function of the Royal Elementor Addons plugin for WordPress.
To fix CVE-2022-4710, update the Royal Elementor Addons plugin for WordPress to version 1.3.60 or newer.