First published: Wed Mar 13 2024(Updated: )
The Exclusive Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Covid-19 Stats Widget in all versions up to, and including, 2.6.9 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Exclusive Addons for Elementor | <2.6.9.1 | |
Exclusive Addons for Elementor | <=2.6.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-2028 has been classified as a significant security vulnerability due to its potential for Stored Cross-Site Scripting attacks.
To fix CVE-2024-2028, update the Exclusive Addons for Elementor plugin to the latest version beyond 2.6.9.
CVE-2024-2028 affects all users of the Exclusive Addons for Elementor plugin on WordPress up to and including version 2.6.9.
CVE-2024-2028 enables authenticated attackers to execute Stored Cross-Site Scripting attacks through the Covid-19 Stats Widget.
Yes, insufficient input sanitization and output escaping are the primary causes of CVE-2024-2028.