First published: Tue Nov 12 2024(Updated: )
The JetWidgets For Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via REST API SVG File uploads in all versions up to, and including, 1.0.18 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Crocoblock JetWidgets For Elementor | <=1.0.18 | |
Crocoblock JetWidgets for Elementor | <1.0.19 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-10323 has a medium severity rating due to the potential for stored cross-site scripting (XSS) attacks.
To fix CVE-2024-10323, update the JetWidgets For Elementor plugin to version 1.0.19 or later.
Any WordPress site using JetWidgets For Elementor plugin versions up to and including 1.0.18 is affected by CVE-2024-10323.
CVE-2024-10323 allows authenticated attackers to perform stored cross-site scripting (XSS) attacks via SVG file uploads.
CVE-2024-10323 affects the JetWidgets For Elementor plugin for WordPress.