First published: Thu Aug 01 2024(Updated: )
The Element Pack - Addon for Elementor Page Builder WordPress Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the widget wrapper link URL in all versions up to, and including, 7.9.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
WordPress Element Pack Pro | <=7.9.0 | |
Element Pack for Elementor | <=7.9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-2455 is classified as a moderate severity vulnerability due to the potential for Stored Cross-Site Scripting attacks.
To remedy CVE-2024-2455, update the Element Pack Addon for Elementor Page Builder plugin to version 7.9.1 or higher.
CVE-2024-2455 affects all versions of the Element Pack Addon for Elementor Page Builder plugin up to and including version 7.9.0.
CVE-2024-2455 is a Stored Cross-Site Scripting (XSS) vulnerability caused by inadequate input sanitization.
The vendor associated with CVE-2024-2455 is Element Pack, which develops the Addon for Elementor Page Builder plugin.