First published: Fri Aug 09 2024(Updated: )
The Element Pack Elementor Addons (Header Footer, Template Library, Dynamic Grid & Carousel, Remote Arrows) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's widgets in all versions up to, and including, 5.7.2 due to insufficient input sanitization and output escaping on user supplied attributes like 'title_tag'. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
BdThemes Element Pack Elementor Addons | <=5.7.2 | |
WordPress Element Pack Pro | <5.7.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-4360 is classified as a high severity vulnerability due to its potential for stored cross-site scripting attacks.
To fix CVE-2024-4360, update the Element Pack Elementor Addons plugin to version 5.7.3 or later.
CVE-2024-4360 is aStored Cross-Site Scripting (XSS) vulnerability affecting versions up to 5.7.2 of the plugin.
CVE-2024-4360 affects the Element Pack Elementor Addons plugin for WordPress.
All versions up to and including 5.7.2 of the Element Pack Elementor Addons are vulnerable to CVE-2024-4360.