The plugins have a number of widgets that are vulnerable to stored Cross-Site Scripting(XSS) by lower-privileged users such as contributors, all via a similar method: The “Card” widget accepts a “title_tag” parameter. Although the element control lists a fixed set of possible html tags, it is possible to send a ‘save_builder’ request with the “heading_tag” set to “script”, and the actual “title” parameter set to JavaScript to be executed within the script tags added by the “heading_tag” parameter. This JavaScript will then be executed when the saved page is viewed or previewed. The other widgets that appear to be exploitable in this manner are: fun-factor: “title_tag” script tag + Javascript in “fun_factor_title” parameter gradient-heading: “title_tag” script tag + Javascript in “title” parameter icon-box: “title_tag” script tag + Javascript in “title” parameter infobox: “title_tag” script tag + Javascript in “title” parameter member: “title_tag” script tag + Javascript in “title” parameter post-list: “title_tag” script tag + Javascript in “title” parameter review: “title_tag” script tag + Javascript in “title” parameter step-flow: “title_tag” script tag + Javascript in “title” parameter These vulnerabilities are nearly identical to the vulnerabilities we have recently disclosed in the main Elementor plugin: https://www.wordfence.com/blog/2021/03/cross-site-scripting-vulnerabilities-in-elementor-impact-over-7-million-sites/
CPE | Name | Operator | Version |
---|---|---|---|
happy-elementor-addons | lt | 2.24.0 | |
happy-elementor-addons-pro | lt | 1.17.0 |