Skip to main content

CVE-2022-3862: CWE-79 Cross-Site Scripting (XSS) in Unknown Livemesh Addons for Elementor

Medium
Published: Mon Dec 12 2022 (12/12/2022, 17:54:57 UTC)
Source: CVE
Vendor/Project: Unknown
Product: Livemesh Addons for Elementor

Description

The Livemesh Addons for Elementor WordPress plugin before 7.2.4 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).

AI-Powered Analysis

AILast updated: 06/21/2025, 18:36:06 UTC

Technical Analysis

CVE-2022-3862 is a stored Cross-Site Scripting (XSS) vulnerability affecting the Livemesh Addons for Elementor WordPress plugin versions prior to 7.2.4. This plugin extends the Elementor page builder with additional widgets and features. The vulnerability arises because certain plugin settings are not properly sanitized or escaped before being stored and rendered. This flaw allows high-privilege users, such as administrators, to inject malicious JavaScript code into the plugin's settings fields. Notably, this attack vector is effective even when the WordPress 'unfiltered_html' capability is disabled, such as in multisite environments, which normally restricts the ability to post unfiltered HTML. The vulnerability requires high privileges to exploit and some user interaction (such as viewing the affected page or settings) to trigger the malicious script. The CVSS 3.1 base score is 4.8 (medium severity), reflecting a network attack vector with low attack complexity but requiring high privileges and user interaction. The impact primarily affects confidentiality and integrity by allowing script execution in the context of the affected site, potentially leading to session hijacking, privilege escalation, or further exploitation within the WordPress environment. There is no indication of known exploits in the wild, and no official patch links were provided in the data, though the fixed version is 7.2.4 or later. The vulnerability is categorized under CWE-79, a common and well-understood XSS weakness. Given the nature of WordPress plugins and their widespread use, this vulnerability could be leveraged in targeted attacks against sites using Livemesh Addons for Elementor, especially those with multiple administrators or multisite configurations where unfiltered HTML is restricted but this flaw bypasses that control.

Potential Impact

For European organizations, the impact of CVE-2022-3862 can be significant, particularly for those relying on WordPress sites with the Livemesh Addons for Elementor plugin. The vulnerability allows high-privilege users to inject malicious scripts that execute in the context of the website, potentially compromising sensitive data such as user credentials, session tokens, or administrative controls. This can lead to unauthorized access, defacement, or pivoting to other internal systems. Organizations in sectors such as finance, government, healthcare, and e-commerce, which often use WordPress for public-facing or internal portals, may face reputational damage, data breaches, and regulatory non-compliance (e.g., GDPR violations) if exploited. The fact that the vulnerability bypasses the 'unfiltered_html' restriction in multisite setups increases risk for large organizations and hosting providers managing multiple client sites. Although exploitation requires high privileges, insider threats or compromised administrator accounts could leverage this flaw to escalate attacks. The lack of known exploits in the wild suggests limited immediate risk, but the medium severity score and ease of exploitation by privileged users warrant prompt attention.

Mitigation Recommendations

Upgrade the Livemesh Addons for Elementor plugin to version 7.2.4 or later, where the vulnerability is fixed. Audit and restrict administrator privileges to minimize the number of users with high-level access capable of exploiting this vulnerability. Implement strict role-based access controls (RBAC) and monitor administrative activities for suspicious behavior. Use Web Application Firewalls (WAFs) with custom rules to detect and block suspicious payloads targeting plugin settings fields. Regularly scan WordPress installations with specialized vulnerability scanners (e.g., WPScan) to detect outdated plugins and known vulnerabilities. For multisite WordPress setups, review and tighten network-wide security policies, including limiting plugin installations and updates to trusted administrators. Educate administrators about the risks of stored XSS and the importance of validating inputs even in trusted user contexts. Backup WordPress sites regularly to enable quick restoration in case of compromise. Consider implementing Content Security Policy (CSP) headers to reduce the impact of XSS by restricting script execution sources.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
WPScan
Date Reserved
2022-11-04T13:56:28.166Z
Cisa Enriched
true

Threat ID: 682d984ac4522896dcbf7309

Added to database: 5/21/2025, 9:09:30 AM

Last enriched: 6/21/2025, 6:36:06 PM

Last updated: 7/30/2025, 11:35:24 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats