Lucene search

K
wpvulndbRamuel GallWPVDB-ID:0F20E098-8106-451F-9448-D35A79F03077
HistoryApr 26, 2021 - 12:00 a.m.

Happy Addons for Elementor Free < 2.24.0 and Pro < 1.17.0 - Contributor+ Stored XSS

2021-04-2600:00:00
Ramuel Gall
wpscan.com
10

0.001 Low

EPSS

Percentile

21.6%

The plugins have a number of widgets that are vulnerable to stored Cross-Site Scripting(XSS) by lower-privileged users such as contributors, all via a similar method: The “Card” widget accepts a “title_tag” parameter. Although the element control lists a fixed set of possible html tags, it is possible to send a ‘save_builder’ request with the “heading_tag” set to “script”, and the actual “title” parameter set to JavaScript to be executed within the script tags added by the “heading_tag” parameter. This JavaScript will then be executed when the saved page is viewed or previewed. The other widgets that appear to be exploitable in this manner are: fun-factor: “title_tag” script tag + Javascript in “fun_factor_title” parameter gradient-heading: “title_tag” script tag + Javascript in “title” parameter icon-box: “title_tag” script tag + Javascript in “title” parameter infobox: “title_tag” script tag + Javascript in “title” parameter member: “title_tag” script tag + Javascript in “title” parameter post-list: “title_tag” script tag + Javascript in “title” parameter review: “title_tag” script tag + Javascript in “title” parameter step-flow: “title_tag” script tag + Javascript in “title” parameter These vulnerabilities are nearly identical to the vulnerabilities we have recently disclosed in the main Elementor plugin: https://www.wordfence.com/blog/2021/03/cross-site-scripting-vulnerabilities-in-elementor-impact-over-7-million-sites/

0.001 Low

EPSS

Percentile

21.6%

Related for WPVDB-ID:0F20E098-8106-451F-9448-D35A79F03077