The Essential Addons for Elementor Lite WordPress plugin is vulnerable to Cross-Site Scripting due to insufficient escaping and sanitization of the settings parameter found in the ~/includes/Traits/Helper.php file which allows attackers to inject arbitrary web scripts onto a pages that executes whenever a user clicks on a specially crafted link by an attacker. This affects versions up to and including 5.0.8.
References
Configurations
History
03 Mar 2022, 21:17
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2680585%40essential-addons-for-elementor-lite&new=2680585%40essential-addons-for-elementor-lite&sfp_email=&sfph_mail= - Patch, Third Party Advisory | |
References | (MISC) https://www.wordfence.com/vulnerability-advisories/#CVE-2022-0683 - Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : 4.3
v3 : 6.1 |
CPE | cpe:2.3:a:wpdeveloper:essential_addons_for_elementor:*:*:*:*:*:wordpress:*:* | |
CWE | CWE-79 |
24 Feb 2022, 19:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-02-24 19:15
Updated : 2024-02-04 22:29
NVD link : CVE-2022-0683
Mitre link : CVE-2022-0683
CVE.ORG link : CVE-2022-0683
JSON object : View
Products Affected
wpdeveloper
- essential_addons_for_elementor
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')