Vulnerabilites related to Unknown - Elementor Website Builder
CVE-2021-24891 (GCVE-0-2021-24891)
Vulnerability from cvelistv5
Published
2021-11-23 19:16
Modified
2024-08-03 19:49
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-79 - Cross-site Scripting (XSS)
Summary
The Elementor Website Builder WordPress plugin before 3.4.8 does not sanitise or escape user input appended to the DOM via a malicious hash, resulting in a DOM Cross-Site Scripting issue.
References
▼ | URL | Tags |
---|---|---|
https://www.jbelamor.com/xss-elementor-lightox.html | x_refsource_MISC | |
https://wpscan.com/vulnerability/fbed0daa-007d-4f91-8d87-4bca7781de2d | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Unknown | Elementor Website Builder |
Version: 3.4.8 < 3.4.8 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T19:49:14.369Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.jbelamor.com/xss-elementor-lightox.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://wpscan.com/vulnerability/fbed0daa-007d-4f91-8d87-4bca7781de2d" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Elementor Website Builder", "vendor": "Unknown", "versions": [ { "lessThan": "3.4.8", "status": "affected", "version": "3.4.8", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Joel" } ], "descriptions": [ { "lang": "en", "value": "The Elementor Website Builder WordPress plugin before 3.4.8 does not sanitise or escape user input appended to the DOM via a malicious hash, resulting in a DOM Cross-Site Scripting issue." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Cross-site Scripting (XSS)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-07T11:17:20", "orgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "shortName": "WPScan" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.jbelamor.com/xss-elementor-lightox.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://wpscan.com/vulnerability/fbed0daa-007d-4f91-8d87-4bca7781de2d" } ], "source": { "discovery": "EXTERNAL" }, "title": "Elementor \u003c 3.4.8 - DOM Cross-Site-Scripting", "x_generator": "WPScan CVE Generator", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "contact@wpscan.com", "ID": "CVE-2021-24891", "STATE": "PUBLIC", "TITLE": "Elementor \u003c 3.4.8 - DOM Cross-Site-Scripting" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Elementor Website Builder", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "3.4.8", "version_value": "3.4.8" } ] } } ] }, "vendor_name": "Unknown" } ] } }, "credit": [ { "lang": "eng", "value": "Joel" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Elementor Website Builder WordPress plugin before 3.4.8 does not sanitise or escape user input appended to the DOM via a malicious hash, resulting in a DOM Cross-Site Scripting issue." } ] }, "generator": "WPScan CVE Generator", "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-79 Cross-site Scripting (XSS)" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.jbelamor.com/xss-elementor-lightox.html", "refsource": "MISC", "url": "https://www.jbelamor.com/xss-elementor-lightox.html" }, { "name": "https://wpscan.com/vulnerability/fbed0daa-007d-4f91-8d87-4bca7781de2d", "refsource": "MISC", "url": "https://wpscan.com/vulnerability/fbed0daa-007d-4f91-8d87-4bca7781de2d" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "assignerShortName": "WPScan", "cveId": "CVE-2021-24891", "datePublished": "2021-11-23T19:16:21", "dateReserved": "2021-01-14T00:00:00", "dateUpdated": "2024-08-03T19:49:14.369Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-0329 (GCVE-0-2023-0329)
Vulnerability from cvelistv5
Published
2023-05-30 07:49
Modified
2025-04-23 16:21
Severity ?
VLAI Severity ?
EPSS score ?
Summary
The Elementor Website Builder WordPress plugin before 3.12.2 does not properly sanitize and escape the Replace URL parameter in the Tools module before using it in a SQL statement, leading to a SQL injection exploitable by users with the Administrator role.
References
▼ | URL | Tags |
---|---|---|
https://wpscan.com/vulnerability/a875836d-77f4-4306-b275-2b60efff1493 | exploit, vdb-entry, technical-description | |
http://packetstormsecurity.com/files/175639/Elementor-Website-Builder-SQL-Injection.html |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Unknown | Elementor Website Builder |
Version: 0 < 3.12.2 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T05:10:55.060Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "exploit", "vdb-entry", "technical-description", "x_transferred" ], "url": "https://wpscan.com/vulnerability/a875836d-77f4-4306-b275-2b60efff1493" }, { "tags": [ "x_transferred" ], "url": "http://packetstormsecurity.com/files/175639/Elementor-Website-Builder-SQL-Injection.html" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-0329", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-04-23T16:07:20.517614Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-23T16:21:31.797Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "collectionURL": "https://wordpress.org/plugins", "defaultStatus": "unaffected", "product": "Elementor Website Builder", "vendor": "Unknown", "versions": [ { "lessThan": "3.12.2", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Sanjay Das" }, { "lang": "en", "type": "coordinator", "value": "WPScan" } ], "descriptions": [ { "lang": "en", "value": "The Elementor Website Builder WordPress plugin before 3.12.2 does not properly sanitize and escape the Replace URL parameter in the Tools module before using it in a SQL statement, leading to a SQL injection exploitable by users with the Administrator role." } ], "problemTypes": [ { "descriptions": [ { "description": "CWE-89 SQL Injection", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-13T23:06:12.609Z", "orgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "shortName": "WPScan" }, "references": [ { "tags": [ "exploit", "vdb-entry", "technical-description" ], "url": "https://wpscan.com/vulnerability/a875836d-77f4-4306-b275-2b60efff1493" }, { "url": "http://packetstormsecurity.com/files/175639/Elementor-Website-Builder-SQL-Injection.html" } ], "source": { "discovery": "EXTERNAL" }, "title": "Elementor Website Builder \u003c 3.12.2 - Admin+ SQLi", "x_generator": { "engine": "WPScan CVE Generator" } } }, "cveMetadata": { "assignerOrgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "assignerShortName": "WPScan", "cveId": "CVE-2023-0329", "datePublished": "2023-05-30T07:49:13.896Z", "dateReserved": "2023-01-16T19:21:03.388Z", "dateUpdated": "2025-04-23T16:21:31.797Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-24203 (GCVE-0-2021-24203)
Vulnerability from cvelistv5
Published
2021-04-05 18:27
Modified
2024-08-03 19:21
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-79 - Cross-site Scripting (XSS)
Summary
In the Elementor Website Builder WordPress plugin before 3.1.4, the divider widget (includes/widgets/divider.php) accepts an ‘html_tag’ parameter. Although the element control lists a fixed set of possible html tags, it is possible for a user with Contributor or above permissions to send a modified ‘save_builder’ request with this parameter set to ‘script’ and combined with a ‘text’ parameter containing JavaScript, which will then be executed when the saved page is viewed or previewed.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Unknown | Elementor Website Builder |
Version: 3.1.4 < 3.1.4 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T19:21:18.671Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.wordfence.com/blog/2021/03/cross-site-scripting-vulnerabilities-in-elementor-impact-over-7-million-sites/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://wpscan.com/vulnerability/aa152ad0-5b3d-4d1f-88f4-6899a546e72e" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Elementor Website Builder", "vendor": "Unknown", "versions": [ { "lessThan": "3.1.4", "status": "affected", "version": "3.1.4", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Ramuel Gall" } ], "descriptions": [ { "lang": "en", "value": "In the Elementor Website Builder WordPress plugin before 3.1.4, the divider widget (includes/widgets/divider.php) accepts an \u2018html_tag\u2019 parameter. Although the element control lists a fixed set of possible html tags, it is possible for a user with Contributor or above permissions to send a modified \u2018save_builder\u2019 request with this parameter set to \u2018script\u2019 and combined with a \u2018text\u2019 parameter containing JavaScript, which will then be executed when the saved page is viewed or previewed." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Cross-site Scripting (XSS)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-04-05T18:27:46", "orgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "shortName": "WPScan" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.wordfence.com/blog/2021/03/cross-site-scripting-vulnerabilities-in-elementor-impact-over-7-million-sites/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://wpscan.com/vulnerability/aa152ad0-5b3d-4d1f-88f4-6899a546e72e" } ], "source": { "discovery": "UNKNOWN" }, "title": "Elementor \u003c 3.1.2 - Authenticated Stored Cross-Site Scripting (XSS) in Divider Widget", "x_generator": "WPScan CVE Generator", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "contact@wpscan.com", "ID": "CVE-2021-24203", "STATE": "PUBLIC", "TITLE": "Elementor \u003c 3.1.2 - Authenticated Stored Cross-Site Scripting (XSS) in Divider Widget" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Elementor Website Builder", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "3.1.4", "version_value": "3.1.4" } ] } } ] }, "vendor_name": "Unknown" } ] } }, "credit": [ { "lang": "eng", "value": "Ramuel Gall" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In the Elementor Website Builder WordPress plugin before 3.1.4, the divider widget (includes/widgets/divider.php) accepts an \u2018html_tag\u2019 parameter. Although the element control lists a fixed set of possible html tags, it is possible for a user with Contributor or above permissions to send a modified \u2018save_builder\u2019 request with this parameter set to \u2018script\u2019 and combined with a \u2018text\u2019 parameter containing JavaScript, which will then be executed when the saved page is viewed or previewed." } ] }, "generator": "WPScan CVE Generator", "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-79 Cross-site Scripting (XSS)" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.wordfence.com/blog/2021/03/cross-site-scripting-vulnerabilities-in-elementor-impact-over-7-million-sites/", "refsource": "MISC", "url": "https://www.wordfence.com/blog/2021/03/cross-site-scripting-vulnerabilities-in-elementor-impact-over-7-million-sites/" }, { "name": "https://wpscan.com/vulnerability/aa152ad0-5b3d-4d1f-88f4-6899a546e72e", "refsource": "CONFIRM", "url": "https://wpscan.com/vulnerability/aa152ad0-5b3d-4d1f-88f4-6899a546e72e" } ] }, "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "assignerShortName": "WPScan", "cveId": "CVE-2021-24203", "datePublished": "2021-04-05T18:27:46", "dateReserved": "2021-01-14T00:00:00", "dateUpdated": "2024-08-03T19:21:18.671Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-24202 (GCVE-0-2021-24202)
Vulnerability from cvelistv5
Published
2021-04-05 18:27
Modified
2024-08-03 19:21
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-79 - Cross-site Scripting (XSS)
Summary
In the Elementor Website Builder WordPress plugin before 3.1.4, the heading widget (includes/widgets/heading.php) accepts a ‘header_size’ parameter. Although the element control lists a fixed set of possible html tags, it is possible for a user with Contributor or above permissions to send a modified ‘save_builder’ request with this parameter set to ‘script’ and combined with a ‘title’ parameter containing JavaScript, which will then be executed when the saved page is viewed or previewed.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Unknown | Elementor Website Builder |
Version: 3.1.4 < 3.1.4 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T19:21:18.620Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.wordfence.com/blog/2021/03/cross-site-scripting-vulnerabilities-in-elementor-impact-over-7-million-sites/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://wpscan.com/vulnerability/b72bd13d-c8e2-4347-b009-542fc0fe21bb" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Elementor Website Builder", "vendor": "Unknown", "versions": [ { "lessThan": "3.1.4", "status": "affected", "version": "3.1.4", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Ramuel Gall" } ], "descriptions": [ { "lang": "en", "value": "In the Elementor Website Builder WordPress plugin before 3.1.4, the heading widget (includes/widgets/heading.php) accepts a \u2018header_size\u2019 parameter. Although the element control lists a fixed set of possible html tags, it is possible for a user with Contributor or above permissions to send a modified \u2018save_builder\u2019 request with this parameter set to \u2018script\u2019 and combined with a \u2018title\u2019 parameter containing JavaScript, which will then be executed when the saved page is viewed or previewed." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Cross-site Scripting (XSS)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-04-05T18:27:46", "orgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "shortName": "WPScan" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.wordfence.com/blog/2021/03/cross-site-scripting-vulnerabilities-in-elementor-impact-over-7-million-sites/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://wpscan.com/vulnerability/b72bd13d-c8e2-4347-b009-542fc0fe21bb" } ], "source": { "discovery": "UNKNOWN" }, "title": "Elementor \u003c 3.1.2 - Authenticated Stored Cross-Site Scripting (XSS) in Heading Widget", "x_generator": "WPScan CVE Generator", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "contact@wpscan.com", "ID": "CVE-2021-24202", "STATE": "PUBLIC", "TITLE": "Elementor \u003c 3.1.2 - Authenticated Stored Cross-Site Scripting (XSS) in Heading Widget" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Elementor Website Builder", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "3.1.4", "version_value": "3.1.4" } ] } } ] }, "vendor_name": "Unknown" } ] } }, "credit": [ { "lang": "eng", "value": "Ramuel Gall" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In the Elementor Website Builder WordPress plugin before 3.1.4, the heading widget (includes/widgets/heading.php) accepts a \u2018header_size\u2019 parameter. Although the element control lists a fixed set of possible html tags, it is possible for a user with Contributor or above permissions to send a modified \u2018save_builder\u2019 request with this parameter set to \u2018script\u2019 and combined with a \u2018title\u2019 parameter containing JavaScript, which will then be executed when the saved page is viewed or previewed." } ] }, "generator": "WPScan CVE Generator", "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-79 Cross-site Scripting (XSS)" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.wordfence.com/blog/2021/03/cross-site-scripting-vulnerabilities-in-elementor-impact-over-7-million-sites/", "refsource": "MISC", "url": "https://www.wordfence.com/blog/2021/03/cross-site-scripting-vulnerabilities-in-elementor-impact-over-7-million-sites/" }, { "name": "https://wpscan.com/vulnerability/b72bd13d-c8e2-4347-b009-542fc0fe21bb", "refsource": "CONFIRM", "url": "https://wpscan.com/vulnerability/b72bd13d-c8e2-4347-b009-542fc0fe21bb" } ] }, "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "assignerShortName": "WPScan", "cveId": "CVE-2021-24202", "datePublished": "2021-04-05T18:27:46", "dateReserved": "2021-01-14T00:00:00", "dateUpdated": "2024-08-03T19:21:18.620Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-4953 (GCVE-0-2022-4953)
Vulnerability from cvelistv5
Published
2023-08-14 19:10
Modified
2024-08-03 01:55
Severity ?
VLAI Severity ?
EPSS score ?
Summary
The Elementor Website Builder WordPress plugin before 3.5.5 does not filter out user-controlled URLs from being loaded into the DOM. This could be used to inject rogue iframes that point to malicious URLs.
References
▼ | URL | Tags |
---|---|---|
https://wpscan.com/vulnerability/8273357e-f9e1-44bc-8082-8faab838eda7 | exploit, vdb-entry, technical-description | |
https://github.com/elementor/elementor/commit/292fc49e0f979bd52d838f0326d1faaebfa59f5e |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Unknown | Elementor Website Builder |
Version: 0 < 3.5.5 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T01:55:46.165Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "exploit", "vdb-entry", "technical-description", "x_transferred" ], "url": "https://wpscan.com/vulnerability/8273357e-f9e1-44bc-8082-8faab838eda7" }, { "tags": [ "x_transferred" ], "url": "https://github.com/elementor/elementor/commit/292fc49e0f979bd52d838f0326d1faaebfa59f5e" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "collectionURL": "https://wordpress.org/plugins", "defaultStatus": "unaffected", "product": "Elementor Website Builder", "vendor": "Unknown", "versions": [ { "lessThan": "3.5.5", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Miguel Santareno" }, { "lang": "en", "type": "coordinator", "value": "WPScan" } ], "descriptions": [ { "lang": "en", "value": "The Elementor Website Builder WordPress plugin before 3.5.5 does not filter out user-controlled URLs from being loaded into the DOM. This could be used to inject rogue iframes that point to malicious URLs." } ], "problemTypes": [ { "descriptions": [ { "description": "CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-16T15:54:02.581Z", "orgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "shortName": "WPScan" }, "references": [ { "tags": [ "exploit", "vdb-entry", "technical-description" ], "url": "https://wpscan.com/vulnerability/8273357e-f9e1-44bc-8082-8faab838eda7" }, { "url": "https://github.com/elementor/elementor/commit/292fc49e0f979bd52d838f0326d1faaebfa59f5e" } ], "source": { "discovery": "EXTERNAL" }, "title": "Elementor \u003c 3.5.5 - Iframe Injection", "x_generator": { "engine": "WPScan CVE Generator" } } }, "cveMetadata": { "assignerOrgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "assignerShortName": "WPScan", "cveId": "CVE-2022-4953", "datePublished": "2023-08-14T19:10:18.365Z", "dateReserved": "2023-07-19T14:34:10.640Z", "dateUpdated": "2024-08-03T01:55:46.165Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-24206 (GCVE-0-2021-24206)
Vulnerability from cvelistv5
Published
2021-04-05 18:27
Modified
2024-08-03 19:21
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-79 - Cross-site Scripting (XSS)
Summary
In the Elementor Website Builder WordPress plugin before 3.1.4, the image box widget (includes/widgets/image-box.php) accepts a ‘title_size’ parameter. Although the element control lists a fixed set of possible html tags, it is possible for a user with Contributor or above permissions to send a modified ‘save_builder’ request containing JavaScript in the ‘title_size’ parameter, which is not filtered and is output without escaping. This JavaScript will then be executed when the saved page is viewed or previewed.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Unknown | Elementor Website Builder |
Version: 3.1.4 < 3.1.4 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T19:21:18.814Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.wordfence.com/blog/2021/03/cross-site-scripting-vulnerabilities-in-elementor-impact-over-7-million-sites/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://wpscan.com/vulnerability/2f66efd9-7d55-4f33-9109-3cb583a0c309" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Elementor Website Builder", "vendor": "Unknown", "versions": [ { "lessThan": "3.1.4", "status": "affected", "version": "3.1.4", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Ramuel Gall" } ], "descriptions": [ { "lang": "en", "value": "In the Elementor Website Builder WordPress plugin before 3.1.4, the image box widget (includes/widgets/image-box.php) accepts a \u2018title_size\u2019 parameter. Although the element control lists a fixed set of possible html tags, it is possible for a user with Contributor or above permissions to send a modified \u2018save_builder\u2019 request containing JavaScript in the \u2018title_size\u2019 parameter, which is not filtered and is output without escaping. This JavaScript will then be executed when the saved page is viewed or previewed." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Cross-site Scripting (XSS)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-04-05T18:27:46", "orgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "shortName": "WPScan" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.wordfence.com/blog/2021/03/cross-site-scripting-vulnerabilities-in-elementor-impact-over-7-million-sites/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://wpscan.com/vulnerability/2f66efd9-7d55-4f33-9109-3cb583a0c309" } ], "source": { "discovery": "UNKNOWN" }, "title": "Elementor \u003c 3.1.2 - Authenticated Stored Cross-Site Scripting (XSS) in Image Box Widget", "x_generator": "WPScan CVE Generator", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "contact@wpscan.com", "ID": "CVE-2021-24206", "STATE": "PUBLIC", "TITLE": "Elementor \u003c 3.1.2 - Authenticated Stored Cross-Site Scripting (XSS) in Image Box Widget" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Elementor Website Builder", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "3.1.4", "version_value": "3.1.4" } ] } } ] }, "vendor_name": "Unknown" } ] } }, "credit": [ { "lang": "eng", "value": "Ramuel Gall" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In the Elementor Website Builder WordPress plugin before 3.1.4, the image box widget (includes/widgets/image-box.php) accepts a \u2018title_size\u2019 parameter. Although the element control lists a fixed set of possible html tags, it is possible for a user with Contributor or above permissions to send a modified \u2018save_builder\u2019 request containing JavaScript in the \u2018title_size\u2019 parameter, which is not filtered and is output without escaping. This JavaScript will then be executed when the saved page is viewed or previewed." } ] }, "generator": "WPScan CVE Generator", "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-79 Cross-site Scripting (XSS)" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.wordfence.com/blog/2021/03/cross-site-scripting-vulnerabilities-in-elementor-impact-over-7-million-sites/", "refsource": "MISC", "url": "https://www.wordfence.com/blog/2021/03/cross-site-scripting-vulnerabilities-in-elementor-impact-over-7-million-sites/" }, { "name": "https://wpscan.com/vulnerability/2f66efd9-7d55-4f33-9109-3cb583a0c309", "refsource": "CONFIRM", "url": "https://wpscan.com/vulnerability/2f66efd9-7d55-4f33-9109-3cb583a0c309" } ] }, "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "assignerShortName": "WPScan", "cveId": "CVE-2021-24206", "datePublished": "2021-04-05T18:27:46", "dateReserved": "2021-01-14T00:00:00", "dateUpdated": "2024-08-03T19:21:18.814Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-24201 (GCVE-0-2021-24201)
Vulnerability from cvelistv5
Published
2021-04-05 18:27
Modified
2024-08-03 19:21
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-79 - Cross-site Scripting (XSS)
Summary
In the Elementor Website Builder WordPress plugin before 3.1.4, the column element (includes/elements/column.php) accepts an ‘html_tag’ parameter. Although the element control lists a fixed set of possible html tags, it is possible for a user with Contributor or above permissions to send a modified ‘save_builder’ request containing JavaScript in the ‘html_tag’ parameter, which is not filtered and is output without escaping. This JavaScript will then be executed when the saved page is viewed or previewed.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Unknown | Elementor Website Builder |
Version: 3.1.4 < 3.1.4 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T19:21:18.669Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://wpscan.com/vulnerability/9647f516-b130-4cc8-85fb-2e69b034ced0" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.wordfence.com/blog/2021/03/cross-site-scripting-vulnerabilities-in-elementor-impact-over-7-million-sites/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Elementor Website Builder", "vendor": "Unknown", "versions": [ { "lessThan": "3.1.4", "status": "affected", "version": "3.1.4", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Ramuel Gall" } ], "descriptions": [ { "lang": "en", "value": "In the Elementor Website Builder WordPress plugin before 3.1.4, the column element (includes/elements/column.php) accepts an \u2018html_tag\u2019 parameter. Although the element control lists a fixed set of possible html tags, it is possible for a user with Contributor or above permissions to send a modified \u2018save_builder\u2019 request containing JavaScript in the \u2018html_tag\u2019 parameter, which is not filtered and is output without escaping. This JavaScript will then be executed when the saved page is viewed or previewed." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Cross-site Scripting (XSS)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-04-05T18:27:46", "orgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "shortName": "WPScan" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://wpscan.com/vulnerability/9647f516-b130-4cc8-85fb-2e69b034ced0" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.wordfence.com/blog/2021/03/cross-site-scripting-vulnerabilities-in-elementor-impact-over-7-million-sites/" } ], "source": { "discovery": "UNKNOWN" }, "title": "Elementor \u003c 3.1.2 - Authenticated Stored Cross-Site Scripting (XSS) in Column Element", "x_generator": "WPScan CVE Generator", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "contact@wpscan.com", "ID": "CVE-2021-24201", "STATE": "PUBLIC", "TITLE": "Elementor \u003c 3.1.2 - Authenticated Stored Cross-Site Scripting (XSS) in Column Element" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Elementor Website Builder", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "3.1.4", "version_value": "3.1.4" } ] } } ] }, "vendor_name": "Unknown" } ] } }, "credit": [ { "lang": "eng", "value": "Ramuel Gall" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In the Elementor Website Builder WordPress plugin before 3.1.4, the column element (includes/elements/column.php) accepts an \u2018html_tag\u2019 parameter. Although the element control lists a fixed set of possible html tags, it is possible for a user with Contributor or above permissions to send a modified \u2018save_builder\u2019 request containing JavaScript in the \u2018html_tag\u2019 parameter, which is not filtered and is output without escaping. This JavaScript will then be executed when the saved page is viewed or previewed." } ] }, "generator": "WPScan CVE Generator", "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-79 Cross-site Scripting (XSS)" } ] } ] }, "references": { "reference_data": [ { "name": "https://wpscan.com/vulnerability/9647f516-b130-4cc8-85fb-2e69b034ced0", "refsource": "CONFIRM", "url": "https://wpscan.com/vulnerability/9647f516-b130-4cc8-85fb-2e69b034ced0" }, { "name": "https://www.wordfence.com/blog/2021/03/cross-site-scripting-vulnerabilities-in-elementor-impact-over-7-million-sites/", "refsource": "MISC", "url": "https://www.wordfence.com/blog/2021/03/cross-site-scripting-vulnerabilities-in-elementor-impact-over-7-million-sites/" } ] }, "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "assignerShortName": "WPScan", "cveId": "CVE-2021-24201", "datePublished": "2021-04-05T18:27:46", "dateReserved": "2021-01-14T00:00:00", "dateUpdated": "2024-08-03T19:21:18.669Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-24205 (GCVE-0-2021-24205)
Vulnerability from cvelistv5
Published
2021-04-05 18:27
Modified
2024-08-03 19:21
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-79 - Cross-site Scripting (XSS)
Summary
In the Elementor Website Builder WordPress plugin before 3.1.4, the icon box widget (includes/widgets/icon-box.php) accepts a ‘title_size’ parameter. Although the element control lists a fixed set of possible html tags, it is possible for a user with Contributor or above permissions to send a modified ‘save_builder’ request containing JavaScript in the ‘title_size’ parameter, which is not filtered and is output without escaping. This JavaScript will then be executed when the saved page is viewed or previewed.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Unknown | Elementor Website Builder |
Version: 3.1.4 < 3.1.4 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T19:21:18.691Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.wordfence.com/blog/2021/03/cross-site-scripting-vulnerabilities-in-elementor-impact-over-7-million-sites/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://wpscan.com/vulnerability/ef23df6d-e265-44f6-bb94-1005b16d34d9" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Elementor Website Builder", "vendor": "Unknown", "versions": [ { "lessThan": "3.1.4", "status": "affected", "version": "3.1.4", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Ramuel Gall" } ], "descriptions": [ { "lang": "en", "value": "In the Elementor Website Builder WordPress plugin before 3.1.4, the icon box widget (includes/widgets/icon-box.php) accepts a \u2018title_size\u2019 parameter. Although the element control lists a fixed set of possible html tags, it is possible for a user with Contributor or above permissions to send a modified \u2018save_builder\u2019 request containing JavaScript in the \u2018title_size\u2019 parameter, which is not filtered and is output without escaping. This JavaScript will then be executed when the saved page is viewed or previewed." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Cross-site Scripting (XSS)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-04-05T18:27:46", "orgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "shortName": "WPScan" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.wordfence.com/blog/2021/03/cross-site-scripting-vulnerabilities-in-elementor-impact-over-7-million-sites/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://wpscan.com/vulnerability/ef23df6d-e265-44f6-bb94-1005b16d34d9" } ], "source": { "discovery": "UNKNOWN" }, "title": "Elementor \u003c 3.1.2 - Authenticated Stored Cross-Site Scripting (XSS) in Icon Box Widget", "x_generator": "WPScan CVE Generator", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "contact@wpscan.com", "ID": "CVE-2021-24205", "STATE": "PUBLIC", "TITLE": "Elementor \u003c 3.1.2 - Authenticated Stored Cross-Site Scripting (XSS) in Icon Box Widget" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Elementor Website Builder", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "3.1.4", "version_value": "3.1.4" } ] } } ] }, "vendor_name": "Unknown" } ] } }, "credit": [ { "lang": "eng", "value": "Ramuel Gall" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In the Elementor Website Builder WordPress plugin before 3.1.4, the icon box widget (includes/widgets/icon-box.php) accepts a \u2018title_size\u2019 parameter. Although the element control lists a fixed set of possible html tags, it is possible for a user with Contributor or above permissions to send a modified \u2018save_builder\u2019 request containing JavaScript in the \u2018title_size\u2019 parameter, which is not filtered and is output without escaping. This JavaScript will then be executed when the saved page is viewed or previewed." } ] }, "generator": "WPScan CVE Generator", "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-79 Cross-site Scripting (XSS)" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.wordfence.com/blog/2021/03/cross-site-scripting-vulnerabilities-in-elementor-impact-over-7-million-sites/", "refsource": "MISC", "url": "https://www.wordfence.com/blog/2021/03/cross-site-scripting-vulnerabilities-in-elementor-impact-over-7-million-sites/" }, { "name": "https://wpscan.com/vulnerability/ef23df6d-e265-44f6-bb94-1005b16d34d9", "refsource": "CONFIRM", "url": "https://wpscan.com/vulnerability/ef23df6d-e265-44f6-bb94-1005b16d34d9" } ] }, "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "assignerShortName": "WPScan", "cveId": "CVE-2021-24205", "datePublished": "2021-04-05T18:27:46", "dateReserved": "2021-01-14T00:00:00", "dateUpdated": "2024-08-03T19:21:18.691Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-24204 (GCVE-0-2021-24204)
Vulnerability from cvelistv5
Published
2021-04-05 18:27
Modified
2024-08-03 19:21
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-79 - Cross-site Scripting (XSS)
Summary
In the Elementor Website Builder WordPress plugin before 3.1.4, the accordion widget (includes/widgets/accordion.php) accepts a ‘title_html_tag’ parameter. Although the element control lists a fixed set of possible html tags, it is possible for a user with Contributor or above permissions to send a modified ‘save_builder’ request containing JavaScript in the ‘title_html_tag’ parameter, which is not filtered and is output without escaping. This JavaScript will then be executed when the saved page is viewed or previewed.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Unknown | Elementor Website Builder |
Version: 3.1.4 < 3.1.4 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T19:21:18.718Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.wordfence.com/blog/2021/03/cross-site-scripting-vulnerabilities-in-elementor-impact-over-7-million-sites/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://wpscan.com/vulnerability/772e172f-c8b4-4a6a-9eb9-9663295cfedf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Elementor Website Builder", "vendor": "Unknown", "versions": [ { "lessThan": "3.1.4", "status": "affected", "version": "3.1.4", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Ramuel Gall" } ], "descriptions": [ { "lang": "en", "value": "In the Elementor Website Builder WordPress plugin before 3.1.4, the accordion widget (includes/widgets/accordion.php) accepts a \u2018title_html_tag\u2019 parameter. Although the element control lists a fixed set of possible html tags, it is possible for a user with Contributor or above permissions to send a modified \u2018save_builder\u2019 request containing JavaScript in the \u2018title_html_tag\u2019 parameter, which is not filtered and is output without escaping. This JavaScript will then be executed when the saved page is viewed or previewed." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Cross-site Scripting (XSS)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-04-05T18:27:46", "orgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "shortName": "WPScan" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.wordfence.com/blog/2021/03/cross-site-scripting-vulnerabilities-in-elementor-impact-over-7-million-sites/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://wpscan.com/vulnerability/772e172f-c8b4-4a6a-9eb9-9663295cfedf" } ], "source": { "discovery": "UNKNOWN" }, "title": "Elementor \u003c 3.1.2 - Authenticated Stored Cross-Site Scripting (XSS) in Accordion Widget", "x_generator": "WPScan CVE Generator", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "contact@wpscan.com", "ID": "CVE-2021-24204", "STATE": "PUBLIC", "TITLE": "Elementor \u003c 3.1.2 - Authenticated Stored Cross-Site Scripting (XSS) in Accordion Widget" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Elementor Website Builder", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "3.1.4", "version_value": "3.1.4" } ] } } ] }, "vendor_name": "Unknown" } ] } }, "credit": [ { "lang": "eng", "value": "Ramuel Gall" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In the Elementor Website Builder WordPress plugin before 3.1.4, the accordion widget (includes/widgets/accordion.php) accepts a \u2018title_html_tag\u2019 parameter. Although the element control lists a fixed set of possible html tags, it is possible for a user with Contributor or above permissions to send a modified \u2018save_builder\u2019 request containing JavaScript in the \u2018title_html_tag\u2019 parameter, which is not filtered and is output without escaping. This JavaScript will then be executed when the saved page is viewed or previewed." } ] }, "generator": "WPScan CVE Generator", "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-79 Cross-site Scripting (XSS)" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.wordfence.com/blog/2021/03/cross-site-scripting-vulnerabilities-in-elementor-impact-over-7-million-sites/", "refsource": "MISC", "url": "https://www.wordfence.com/blog/2021/03/cross-site-scripting-vulnerabilities-in-elementor-impact-over-7-million-sites/" }, { "name": "https://wpscan.com/vulnerability/772e172f-c8b4-4a6a-9eb9-9663295cfedf", "refsource": "CONFIRM", "url": "https://wpscan.com/vulnerability/772e172f-c8b4-4a6a-9eb9-9663295cfedf" } ] }, "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "assignerShortName": "WPScan", "cveId": "CVE-2021-24204", "datePublished": "2021-04-05T18:27:46", "dateReserved": "2021-01-14T00:00:00", "dateUpdated": "2024-08-03T19:21:18.718Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }