The WPB Elementor Addons plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'url' parameter due to insufficient input sanitization and output escaping
Reporter | Title | Published | Views | Family All 5 |
---|---|---|---|---|
![]() | CVE-2024-4896 WPB Elementor Addons <= 1.0.9 - Authenticated (Contributor+) Stored Cross-Site Scripting via url Parameter | 22 May 202408:31 | – | cvelist |
![]() | CVE-2024-4896 | 22 May 202409:15 | – | nvd |
![]() | WPB Elementor Addons < 1.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via url Parameter | 21 May 202400:00 | – | wpvulndb |
![]() | CVE-2024-4896 WPB Elementor Addons <= 1.0.9 - Authenticated (Contributor+) Stored Cross-Site Scripting via url Parameter | 22 May 202408:31 | – | vulnrichment |
![]() | Wordfence Intelligence Weekly WordPress Vulnerability Report (May 20, 2024 to May 26, 2024) | 30 May 202415:23 | – | wordfence |
[
{
"vendor": "wpbean",
"product": "WPB Elementor Addons",
"versions": [
{
"version": "*",
"status": "affected",
"lessThanOrEqual": "1.0.9",
"versionType": "semver"
}
],
"defaultStatus": "unaffected"
}
]
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo