First published: Wed Nov 15 2023(Updated: )
The Elementor Addon Elements plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in versions up to, and including, 1.12.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Webtechstreet Elementor Addon Elements | <=1.12.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-5381 is a vulnerability in the Elementor Addon Elements plugin for WordPress that allows for stored cross-site scripting (XSS) attacks.
CVE-2023-5381 has a severity rating of medium, with a CVSS score of 4.4.
Versions up to and including 1.12.7 of the Elementor Addon Elements plugin for WordPress are affected by CVE-2023-5381.
With administrator-level permissions, authenticated attackers can exploit CVE-2023-5381 through stored cross-site scripting (XSS) attacks via the admin settings of the plugin.
Yes, updating to a version of the Elementor Addon Elements plugin for WordPress beyond 1.12.7 will mitigate the vulnerability.