First published: Thu May 02 2024(Updated: )
The ElementsKit Elementor addons plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Image Accordion widget in all versions 3.0.7 through 3.1.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Wpmet ElementsKit Elementor Addons | >=3.0.7<3.1.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-3650 has a moderate severity level due to its potential for Stored Cross-Site Scripting attacks.
To fix CVE-2024-3650, upgrade the ElementsKit Elementor addons plugin to version 3.1.3 or later.
CVE-2024-3650 affects all versions of the ElementsKit Elementor addons plugin from 3.0.7 to 3.1.2.
CVE-2024-3650 can be exploited for Stored Cross-Site Scripting attacks by authenticated attackers.
CVE-2024-3650 is associated with the ElementsKit Elementor addons plugin for WordPress.