First published: Thu Jun 27 2024(Updated: )
The Elementor Addon Elements plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘url’ parameter in versions up to, and including, 1.13.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
webtechstreet Elementor Addon Elements | <1.13.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-4569 is classified as a high severity vulnerability due to its potential for stored cross-site scripting attacks.
To mitigate CVE-2024-4569, upgrade the Elementor Addon Elements plugin to version 1.13.6 or later.
CVE-2024-4569 affects users of the Elementor Addon Elements plugin for WordPress versions up to and including 1.13.5.
CVE-2024-4569 enables authenticated attackers to perform stored cross-site scripting attacks through the 'url' parameter.
Yes, exploiting CVE-2024-4569 requires user authentication, enabling attackers with contributor access to exploit the vulnerability.