First published: Thu Mar 07 2024(Updated: )
The Royal Elementor Addons and Templates plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Logo Widget in all versions up to, and including, 1.3.91 due to insufficient input sanitization and output escaping on user supplied URLs. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Royal Elementor Addons | <1.3.92 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-1500 is classified as a moderate severity vulnerability due to the risk of authenticated users exploiting it through stored XSS.
To fix CVE-2024-1500, update the Royal Elementor Addons plugin to version 1.3.92 or later which addresses the input sanitization issues.
CVE-2024-1500 affects all versions of Royal Elementor Addons up to and including 1.3.91.
CVE-2024-1500 is a Stored Cross-Site Scripting (XSS) vulnerability.
No, CVE-2024-1500 requires authentication, allowing only authenticated users to potentially exploit the vulnerability.