First published: Wed Jun 12 2024(Updated: )
The Premium Addons for Elementor plugin for WordPress is vulnerable to DOM-Based Stored Cross-Site Scripting via several parameters in all versions up to, and including, 4.10.33 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses and edits an injected element, and subsequently clicks the element with the mouse scroll wheel.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Leap13 Premium Addons PRO | <4.10.34 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-5553 has a high severity due to the potential for DOM-Based Stored Cross-Site Scripting, which can lead to significant security risks if exploited.
To fix CVE-2024-5553, update the Premium Addons for Elementor plugin to version 4.10.34 or later, which addresses the identified vulnerabilities.
CVE-2024-5553 affects users of the Premium Addons for Elementor plugin for WordPress up to and including version 4.10.33.
CVE-2024-5553 can facilitate authenticated attacker exploits that may lead to arbitrary script execution in a user's browser session.
If exploited, CVE-2024-5553 could result in unauthorized access to user data, session hijacking, and the injection of malicious payloads.