First published: Thu Jun 20 2024(Updated: )
The JetWidgets For Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘layout_type’ and 'id' parameters in all versions up to, and including, 1.0.17 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Crocoblock JetWidgets for Elementor | <1.0.18 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-4626 has been classified as a medium severity vulnerability due to the potential for stored cross-site scripting attacks.
To fix CVE-2024-4626, update the JetWidgets for Elementor plugin to version 1.0.18 or later, which addresses the vulnerability.
CVE-2024-4626 affects all versions up to and including 1.0.17 of the JetWidgets for Elementor plugin for WordPress.
CVE-2024-4626 allows attackers to execute stored cross-site scripting attacks, potentially leading to unauthorized actions on behalf of users.
Yes, authentication is required to exploit CVE-2024-4626, as the vulnerability is present in actions available to authenticated users.