Lucene search

K
wpvulndbRamuel GallWPVDB-ID:7FD89A49-FBB0-4308-836B-1F12DC585B1F
HistoryApr 13, 2021 - 12:00 a.m.

Image Hover Effects - Elementor Addon < 1.3.4 - Contributor+ Stored XSS

2021-04-1300:00:00
Ramuel Gall
wpscan.com
12
wordpress
plugin
cross-site scripting
elementor
vulnerability

EPSS

0.001

Percentile

19.4%

The “Image Hover Effects – Elementor Addon” WordPress Plugin before 1.3.4 has a widget that is vulnerable to stored Cross-Site Scripting (XSS) by lower-privileged users such as contributors, all via a similar method. The “Image Hover Effects” widget accepts a “eihe_tag” parameter. Although the element control lists a fixed set of possible html tags, it is possible to send a ‘save_builder’ request with “eihe_tag” set to JavaScript. Alternatively, it is possible to set “eihe_tag” to simply “script” and add the JavaScript to be executed in the actual title. This JavaScript will then be executed when the saved page is viewed or previewed. This vulnerability is nearly identical to the vulnerabilities we have recently disclosed in the main Elementor plugin: https://www.wordfence.com/blog/2021/03/cross-site-scripting-vulnerabilities-in-elementor-impact-over-7-million-sites/

EPSS

0.001

Percentile

19.4%

Related for WPVDB-ID:7FD89A49-FBB0-4308-836B-1F12DC585B1F