Lucene search

K
wpvulndbRamuel GallWPVDB-ID:9F4771DC-80B5-49FF-9F64-BF6C36F76863
HistoryApr 13, 2021 - 12:00 a.m.

Rife Elementor Extensions & Templates < 1.1.6 - Contributor+ Stored XSS

2021-04-1300:00:00
Ramuel Gall
wpscan.com
10

0.001 Low

EPSS

Percentile

19.6%

The “Rife Elementor Extensions & Templates” WordPress Plugin before 1.1.6 has a widget that is vulnerable to stored Cross-Site Scripting(XSS) by lower-privileged users such as contributors, all via a similar method. The “Writing Effect Headline” widget accepts a “tag” parameter. Although the element control lists a fixed set of possible html tags, it is possible to send a ‘save_builder’ request containing JavaScript in the “tag” parameter, which is not filtered and is output without escaping. This JavaScript will then be executed when the saved page is viewed or previewed. This vulnerability is nearly identical to the vulnerabilities we have recently disclosed in the main Elementor plugin: https://www.wordfence.com/blog/2021/03/cross-site-scripting-vulnerabilities-in-elementor-impact-over-7-million-sites/

CPENameOperatorVersion
rife-elementor-extensionslt1.1.6

0.001 Low

EPSS

Percentile

19.6%

Related for WPVDB-ID:9F4771DC-80B5-49FF-9F64-BF6C36F76863