CVE-2024-5554

The Element Pack Elementor Addons (Header Footer, Template Library, Dynamic Grid & Carousel, Remote Arrows) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘onclick_event’ parameter in all versions up to, and including, 5.6.11 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Configurations

Configuration 1 (hide)

cpe:2.3:a:bdthemes:element_pack:*:*:*:*:lite:wordpress:*:*

History

21 Nov 2024, 09:47

Type Values Removed Values Added
References () https://plugins.trac.wordpress.org/browser/bdthemes-element-pack-lite/tags/5.6.4/modules/step-flow/widgets/step-flow.php#L2287 - Product () https://plugins.trac.wordpress.org/browser/bdthemes-element-pack-lite/tags/5.6.4/modules/step-flow/widgets/step-flow.php#L2287 - Product
References () https://plugins.trac.wordpress.org/changeset/3110404/ - Patch () https://plugins.trac.wordpress.org/changeset/3110404/ - Patch
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/696c379a-c5a4-489f-8363-8aea9a4da814?source=cve - Patch, Third Party Advisory () https://www.wordfence.com/threat-intel/vulnerabilities/id/696c379a-c5a4-489f-8363-8aea9a4da814?source=cve - Patch, Third Party Advisory

22 Aug 2024, 16:43

Type Values Removed Values Added
CWE CWE-79
Summary
  • (es) El complemento Element Pack Elementor Addons (encabezado, pie de página, librería de plantillas, cuadrícula dinámica y carrusel, flechas remotas) para WordPress es vulnerable a Cross-Site Scripting Almacenado a través del parámetro 'onclick_event' en todas las versiones hasta la 5.6.11 incluida, debido a una sanitización de entrada y un escape de salida insuficientes. Esto hace posible que atacantes autenticados, con acceso de nivel de Colaborador y superior, inyecten scripts web arbitrarios en páginas que se ejecutarán cada vez que un usuario acceda a una página inyectada.
References () https://plugins.trac.wordpress.org/browser/bdthemes-element-pack-lite/tags/5.6.4/modules/step-flow/widgets/step-flow.php#L2287 - () https://plugins.trac.wordpress.org/browser/bdthemes-element-pack-lite/tags/5.6.4/modules/step-flow/widgets/step-flow.php#L2287 - Product
References () https://plugins.trac.wordpress.org/changeset/3110404/ - () https://plugins.trac.wordpress.org/changeset/3110404/ - Patch
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/696c379a-c5a4-489f-8363-8aea9a4da814?source=cve - () https://www.wordfence.com/threat-intel/vulnerabilities/id/696c379a-c5a4-489f-8363-8aea9a4da814?source=cve - Patch, Third Party Advisory
CPE cpe:2.3:a:bdthemes:element_pack:*:*:*:*:lite:wordpress:*:*
First Time Bdthemes
Bdthemes element Pack

18 Jul 2024, 09:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-18 09:15

Updated : 2024-11-21 09:47


NVD link : CVE-2024-5554

Mitre link : CVE-2024-5554

CVE.ORG link : CVE-2024-5554


JSON object : View

Products Affected

bdthemes

  • element_pack
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')