First published: Sat Apr 06 2024(Updated: )
The Element Pack Elementor Addons (Header Footer, Free Template Library, Grid, Carousel, Table, Parallax Animation, Register Form, Twitter Grid) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘element_pack_wrapper_link’ attribute of the Trailer Box widget in all versions up to, and including, 5.5.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
WordPress Element Pack Pro | <5.5.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-1428 is classified as a medium severity vulnerability due to the risk of stored cross-site scripting.
To fix CVE-2024-1428, update the Element Pack Elementor Addons plugin to a version that is not affected, ideally 5.5.4 or above.
The impact of CVE-2024-1428 allows an attacker to inject malicious scripts into a web page, potentially compromising user data.
Anyone using the Element Pack Elementor Addons plugin for WordPress versions up to 5.5.4 is affected by CVE-2024-1428.
Yes, a patch is available in the latest version of the Element Pack Elementor Addons plugin, which addresses CVE-2024-1428.