Lucene search

K
wpvulndbRamuel GallWPVDB-ID:68ECB965-2A9D-4E67-B069-C3DBFB14016B
HistoryApr 13, 2021 - 12:00 a.m.

JetWidgets For Elementor < 1.0.9 - Contributor+ Stored XSS

2021-04-1300:00:00
Ramuel Gall
wpscan.com
9

0.001 Low

EPSS

Percentile

19.4%

The “JetWidgets For Elementor” WordPress Plugin before 1.0.9 has several widgets that are vulnerable to stored Cross-Site Scripting (XSS) by lower-privileged users such as contributors, all via a similar method. The “Animated Box” widget accepts “title_html_tag” and “sub_title_html_tag” parameters. Although the element control lists a fixed set of possible html tags, it is possible to send a ‘save_builder’ request with either of these parameters set to JavaScript. Alternatively, it is possible to set “title_html_tag” or “sub_title_html_tag” to simply “script” and add the JavaScript to be executed in the actual title. This JavaScript will then be executed when the saved page is viewed or previewed. We’ve verified that the Headline widget is similarly vulnerable via the “header_size” parameter, and the following widgets also appear to be vulnerable to similar exploits: Images Layout: “title_html_tag” parameter Services: “services_title_size” parameter Team Member: “member_name_html_tag” parameter These vulnerabilities are nearly identical to the vulnerabilities we have recently disclosed in the main Elementor plugin: https://www.wordfence.com/blog/2021/03/cross-site-scripting-vulnerabilities-in-elementor-impact-over-7-million-sites/

CPENameOperatorVersion
jetwidgets-for-elementorlt1.0.9

0.001 Low

EPSS

Percentile

19.4%

Related for WPVDB-ID:68ECB965-2A9D-4E67-B069-C3DBFB14016B