Lucene search

K
wpvulndbRamuel GallWPVDB-ID:48876006-B00F-49B7-80A1-B1D6DC2F4EEC
HistoryApr 13, 2021 - 12:00 a.m.

PowerPack Addons for Elementor < 2.3.2 - Contributor+ Stored XSS

2021-04-1300:00:00
Ramuel Gall
wpscan.com
14

0.001 Low

EPSS

Percentile

21.6%

The “Elementor Addons – PowerPack Addons for Elementor” WordPress Plugin before 2.3.2 for WordPress has several widgets that are vulnerable to stored Cross-Site Scripting (XSS) by lower-privileged users such as contributors, all via a similar method. The “Advanced accordion” widget accepts a “title_html_tag” parameter. Although the element control lists a fixed set of possible html tags, it is possible to send a ‘save_builder’ request containing JavaScript in the “title_html_tag” parameter, which is not filtered and is output without escaping. This JavaScript will then be executed when the saved page is viewed or previewed. The “Counter” widget accepts a “title_html_tag” and a “subtitle_html_tag” parameter. Although the element control lists a fixed set of possible html tags, it is possible to send a ‘save_builder’ request containing JavaScript in these parameters, which is not filtered and is output without escaping. This JavaScript will then be executed when the saved page is viewed or previewed. Additionally the following widgets appear to have similar vulnerabilities: content ticker: title_html_tag parameter divider: text_html_tag parameter flipbox: title_html_tag_front, title_html_tag_back parameters dual-heading: heading_html_tag parameter fancy-heading: heading_html_tag parameter image-accordion: title_html_tag parameter info-box-carousel: title_html_tag,sub_title_html_tag parameters info-box: title_html_tag, sub_title_html_tag parameters info-list: title_html_tag parameter info-table: title_html_tag, sub_title_html_tag parameters logo-carousel: title_html_tag parameter logo-grid: title_html_tag parameter skin-base: title_html_tag parameter promo-box: heading_html_tag, sub_heading_html_tag parameters team-member-carousel: name_html_tag, position_html_tag parameters team-member: name_html_tag, position_html_tag parameters These vulnerabilities are nearly identical to the vulnerabilities we have recently disclosed in the main Elementor plugin: https://www.wordfence.com/blog/2021/03/cross-site-scripting-vulnerabilities-in-elementor-impact-over-7-million-sites/

CPENameOperatorVersion
powerpack-lite-for-elementorlt2.3.2

0.001 Low

EPSS

Percentile

21.6%

Related for WPVDB-ID:48876006-B00F-49B7-80A1-B1D6DC2F4EEC