First published: Fri Aug 02 2024(Updated: )
The Element Pack Elementor Addons (Header Footer, Template Library, Dynamic Grid & Carousel, Remote Arrows) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘end_redirect_link’ parameter in versions up to, and including, 5.7.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
BdThemes Element Pack Elementor Addons | <=5.7.1 | |
WordPress Element Pack Pro | <=5.7.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-4643 has a medium severity rating due to the potential for stored cross-site scripting attacks.
To fix CVE-2024-4643, update the Element Pack Elementor Addons plugin to version 5.7.2 or later.
CVE-2024-4643 affects versions of the Element Pack Elementor Addons plugin up to and including 5.7.1.
CVE-2024-4643 is classified as a Stored Cross-Site Scripting vulnerability.
The vendor for CVE-2024-4643 is Element Pack, which develops the Elementor Addons plugin.