First published: Wed Mar 13 2024(Updated: )
The Prime Slider – Addons For Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'title_tags' attribute of the Rubix widget in all versions up to, and including, 3.13.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Prime Slider Addons For Elementor | <=3.13.2 | |
WordPress Prime Slider | <3.13.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-1507 is classified as a medium severity vulnerability due to its potential for exploitation through stored cross-site scripting.
To fix CVE-2024-1507, upgrade the Prime Slider – Addons For Elementor plugin to version 3.13.3 or later.
The impact of CVE-2024-1507 is that it allows authenticated users to inject malicious scripts into the website, potentially compromising site security.
Users of the Prime Slider – Addons For Elementor plugin for WordPress versions up to and including 3.13.2 are affected by CVE-2024-1507.
CVE-2024-1507 exploits insufficient input sanitization and output escaping in the 'title_tags' attribute of the Rubix widget.