CVE-2022-3862: CWE-79 Cross-Site Scripting (XSS) in Unknown Livemesh Addons for Elementor
The Livemesh Addons for Elementor WordPress plugin before 7.2.4 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
AI Analysis
Technical Summary
CVE-2022-3862 is a stored Cross-Site Scripting (XSS) vulnerability affecting the Livemesh Addons for Elementor WordPress plugin versions prior to 7.2.4. This plugin extends the Elementor page builder with additional widgets and features. The vulnerability arises because certain plugin settings are not properly sanitized or escaped before being stored and rendered. This flaw allows high-privilege users, such as administrators, to inject malicious JavaScript code into the plugin's settings fields. Notably, this attack vector is effective even when the WordPress 'unfiltered_html' capability is disabled, such as in multisite environments, which normally restricts the ability to post unfiltered HTML. The vulnerability requires high privileges to exploit and some user interaction (such as viewing the affected page or settings) to trigger the malicious script. The CVSS 3.1 base score is 4.8 (medium severity), reflecting a network attack vector with low attack complexity but requiring high privileges and user interaction. The impact primarily affects confidentiality and integrity by allowing script execution in the context of the affected site, potentially leading to session hijacking, privilege escalation, or further exploitation within the WordPress environment. There is no indication of known exploits in the wild, and no official patch links were provided in the data, though the fixed version is 7.2.4 or later. The vulnerability is categorized under CWE-79, a common and well-understood XSS weakness. Given the nature of WordPress plugins and their widespread use, this vulnerability could be leveraged in targeted attacks against sites using Livemesh Addons for Elementor, especially those with multiple administrators or multisite configurations where unfiltered HTML is restricted but this flaw bypasses that control.
Potential Impact
For European organizations, the impact of CVE-2022-3862 can be significant, particularly for those relying on WordPress sites with the Livemesh Addons for Elementor plugin. The vulnerability allows high-privilege users to inject malicious scripts that execute in the context of the website, potentially compromising sensitive data such as user credentials, session tokens, or administrative controls. This can lead to unauthorized access, defacement, or pivoting to other internal systems. Organizations in sectors such as finance, government, healthcare, and e-commerce, which often use WordPress for public-facing or internal portals, may face reputational damage, data breaches, and regulatory non-compliance (e.g., GDPR violations) if exploited. The fact that the vulnerability bypasses the 'unfiltered_html' restriction in multisite setups increases risk for large organizations and hosting providers managing multiple client sites. Although exploitation requires high privileges, insider threats or compromised administrator accounts could leverage this flaw to escalate attacks. The lack of known exploits in the wild suggests limited immediate risk, but the medium severity score and ease of exploitation by privileged users warrant prompt attention.
Mitigation Recommendations
Upgrade the Livemesh Addons for Elementor plugin to version 7.2.4 or later, where the vulnerability is fixed. Audit and restrict administrator privileges to minimize the number of users with high-level access capable of exploiting this vulnerability. Implement strict role-based access controls (RBAC) and monitor administrative activities for suspicious behavior. Use Web Application Firewalls (WAFs) with custom rules to detect and block suspicious payloads targeting plugin settings fields. Regularly scan WordPress installations with specialized vulnerability scanners (e.g., WPScan) to detect outdated plugins and known vulnerabilities. For multisite WordPress setups, review and tighten network-wide security policies, including limiting plugin installations and updates to trusted administrators. Educate administrators about the risks of stored XSS and the importance of validating inputs even in trusted user contexts. Backup WordPress sites regularly to enable quick restoration in case of compromise. Consider implementing Content Security Policy (CSP) headers to reduce the impact of XSS by restricting script execution sources.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2022-3862: CWE-79 Cross-Site Scripting (XSS) in Unknown Livemesh Addons for Elementor
Description
The Livemesh Addons for Elementor WordPress plugin before 7.2.4 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
AI-Powered Analysis
Technical Analysis
CVE-2022-3862 is a stored Cross-Site Scripting (XSS) vulnerability affecting the Livemesh Addons for Elementor WordPress plugin versions prior to 7.2.4. This plugin extends the Elementor page builder with additional widgets and features. The vulnerability arises because certain plugin settings are not properly sanitized or escaped before being stored and rendered. This flaw allows high-privilege users, such as administrators, to inject malicious JavaScript code into the plugin's settings fields. Notably, this attack vector is effective even when the WordPress 'unfiltered_html' capability is disabled, such as in multisite environments, which normally restricts the ability to post unfiltered HTML. The vulnerability requires high privileges to exploit and some user interaction (such as viewing the affected page or settings) to trigger the malicious script. The CVSS 3.1 base score is 4.8 (medium severity), reflecting a network attack vector with low attack complexity but requiring high privileges and user interaction. The impact primarily affects confidentiality and integrity by allowing script execution in the context of the affected site, potentially leading to session hijacking, privilege escalation, or further exploitation within the WordPress environment. There is no indication of known exploits in the wild, and no official patch links were provided in the data, though the fixed version is 7.2.4 or later. The vulnerability is categorized under CWE-79, a common and well-understood XSS weakness. Given the nature of WordPress plugins and their widespread use, this vulnerability could be leveraged in targeted attacks against sites using Livemesh Addons for Elementor, especially those with multiple administrators or multisite configurations where unfiltered HTML is restricted but this flaw bypasses that control.
Potential Impact
For European organizations, the impact of CVE-2022-3862 can be significant, particularly for those relying on WordPress sites with the Livemesh Addons for Elementor plugin. The vulnerability allows high-privilege users to inject malicious scripts that execute in the context of the website, potentially compromising sensitive data such as user credentials, session tokens, or administrative controls. This can lead to unauthorized access, defacement, or pivoting to other internal systems. Organizations in sectors such as finance, government, healthcare, and e-commerce, which often use WordPress for public-facing or internal portals, may face reputational damage, data breaches, and regulatory non-compliance (e.g., GDPR violations) if exploited. The fact that the vulnerability bypasses the 'unfiltered_html' restriction in multisite setups increases risk for large organizations and hosting providers managing multiple client sites. Although exploitation requires high privileges, insider threats or compromised administrator accounts could leverage this flaw to escalate attacks. The lack of known exploits in the wild suggests limited immediate risk, but the medium severity score and ease of exploitation by privileged users warrant prompt attention.
Mitigation Recommendations
Upgrade the Livemesh Addons for Elementor plugin to version 7.2.4 or later, where the vulnerability is fixed. Audit and restrict administrator privileges to minimize the number of users with high-level access capable of exploiting this vulnerability. Implement strict role-based access controls (RBAC) and monitor administrative activities for suspicious behavior. Use Web Application Firewalls (WAFs) with custom rules to detect and block suspicious payloads targeting plugin settings fields. Regularly scan WordPress installations with specialized vulnerability scanners (e.g., WPScan) to detect outdated plugins and known vulnerabilities. For multisite WordPress setups, review and tighten network-wide security policies, including limiting plugin installations and updates to trusted administrators. Educate administrators about the risks of stored XSS and the importance of validating inputs even in trusted user contexts. Backup WordPress sites regularly to enable quick restoration in case of compromise. Consider implementing Content Security Policy (CSP) headers to reduce the impact of XSS by restricting script execution sources.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- WPScan
- Date Reserved
- 2022-11-04T13:56:28.166Z
- Cisa Enriched
- true
Threat ID: 682d984ac4522896dcbf7309
Added to database: 5/21/2025, 9:09:30 AM
Last enriched: 6/21/2025, 6:36:06 PM
Last updated: 7/30/2025, 11:35:24 PM
Views: 11
Related Threats
CVE-2025-8113: CWE-79 Cross-Site Scripting (XSS) in Ebook Store
UnknownCVE-2025-8293: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Theerawat Patthawee Intl DateTime Calendar
MediumCVE-2025-7686: CWE-352 Cross-Site Request Forgery (CSRF) in lmyoaoa weichuncai(WP伪春菜)
MediumCVE-2025-7684: CWE-352 Cross-Site Request Forgery (CSRF) in remysharp Last.fm Recent Album Artwork
MediumCVE-2025-7683: CWE-352 Cross-Site Request Forgery (CSRF) in janyksteenbeek LatestCheckins
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.