CVE-2024-1242: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in leap13 Premium Addons for Elementor
CVE-2024-1242 is a stored cross-site scripting (XSS) vulnerability in the Premium Addons for Elementor WordPress plugin, affecting all versions up to 4. 10. 18. The flaw arises from improper input sanitization and output escaping of the button onclick attribute, allowing authenticated users with contributor-level access or higher to inject malicious scripts. These scripts execute whenever any user views the compromised page, potentially leading to session hijacking, defacement, or unauthorized actions. The vulnerability has a CVSS score of 6. 4, indicating medium severity, with no known exploits in the wild currently. Mitigation requires updating the plugin once a patch is available or applying strict input validation and output encoding on user-supplied content. Organizations using this plugin should audit user roles and restrict contributor access to trusted users. Countries with significant WordPress usage and large web publishing sectors, such as the United States, Germany, United Kingdom, Canada, Australia, and India, are most at risk.
AI Analysis
Technical Summary
CVE-2024-1242 identifies a stored cross-site scripting (XSS) vulnerability in the Premium Addons for Elementor plugin for WordPress, specifically in all versions up to and including 4.10.18. The vulnerability stems from improper neutralization of script-related HTML tags (CWE-80) within the button onclick attribute, where insufficient input sanitization and output escaping allow malicious JavaScript code injection. Authenticated attackers with contributor or higher privileges can exploit this by injecting arbitrary scripts into pages. These scripts execute in the context of any user who views the infected page, potentially compromising user sessions, stealing cookies, or performing unauthorized actions on behalf of users. The vulnerability does not require user interaction beyond page access and has a CVSS 3.1 base score of 6.4, reflecting medium severity. The attack vector is network-based with low attack complexity, requiring privileges but no user interaction, and impacts confidentiality and integrity with no direct availability impact. No public exploits are currently known, but the vulnerability's presence in a widely used WordPress plugin increases the risk of future exploitation. The lack of a patch at the time of disclosure necessitates immediate mitigation steps by administrators.
Potential Impact
The primary impact of CVE-2024-1242 is the compromise of confidentiality and integrity of user data and site content. Successful exploitation allows attackers to execute arbitrary JavaScript in the context of the affected website, enabling session hijacking, credential theft, defacement, or unauthorized actions such as privilege escalation or data manipulation. This can erode user trust, damage brand reputation, and lead to regulatory compliance issues if sensitive data is exposed. Since the vulnerability requires contributor-level access, insider threats or compromised contributor accounts pose significant risks. The scope includes all websites using the vulnerable plugin versions, which could be substantial given Elementor's popularity. Although availability is not directly impacted, secondary effects such as site defacement or malicious redirects could disrupt normal operations. Organizations with large user bases or handling sensitive information are particularly vulnerable to reputational and operational damage.
Mitigation Recommendations
Organizations should immediately audit and restrict contributor and higher-level user privileges to trusted personnel only, minimizing the risk of malicious script injection. Until an official patch is released, implement strict input validation and output encoding on all user-supplied content, especially for the button onclick attribute, to neutralize script tags and event handlers. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious payloads targeting this vulnerability. Monitor logs and user activity for unusual script injections or modifications to pages containing buttons. Educate content contributors about safe content practices and the risks of injecting scripts. Once available, promptly update the Premium Addons for Elementor plugin to a patched version. Additionally, consider deploying Content Security Policy (CSP) headers to restrict execution of unauthorized scripts and reduce the impact of potential XSS attacks.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, India, France, Netherlands, Brazil, Japan
CVE-2024-1242: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in leap13 Premium Addons for Elementor
Description
CVE-2024-1242 is a stored cross-site scripting (XSS) vulnerability in the Premium Addons for Elementor WordPress plugin, affecting all versions up to 4. 10. 18. The flaw arises from improper input sanitization and output escaping of the button onclick attribute, allowing authenticated users with contributor-level access or higher to inject malicious scripts. These scripts execute whenever any user views the compromised page, potentially leading to session hijacking, defacement, or unauthorized actions. The vulnerability has a CVSS score of 6. 4, indicating medium severity, with no known exploits in the wild currently. Mitigation requires updating the plugin once a patch is available or applying strict input validation and output encoding on user-supplied content. Organizations using this plugin should audit user roles and restrict contributor access to trusted users. Countries with significant WordPress usage and large web publishing sectors, such as the United States, Germany, United Kingdom, Canada, Australia, and India, are most at risk.
AI-Powered Analysis
Technical Analysis
CVE-2024-1242 identifies a stored cross-site scripting (XSS) vulnerability in the Premium Addons for Elementor plugin for WordPress, specifically in all versions up to and including 4.10.18. The vulnerability stems from improper neutralization of script-related HTML tags (CWE-80) within the button onclick attribute, where insufficient input sanitization and output escaping allow malicious JavaScript code injection. Authenticated attackers with contributor or higher privileges can exploit this by injecting arbitrary scripts into pages. These scripts execute in the context of any user who views the infected page, potentially compromising user sessions, stealing cookies, or performing unauthorized actions on behalf of users. The vulnerability does not require user interaction beyond page access and has a CVSS 3.1 base score of 6.4, reflecting medium severity. The attack vector is network-based with low attack complexity, requiring privileges but no user interaction, and impacts confidentiality and integrity with no direct availability impact. No public exploits are currently known, but the vulnerability's presence in a widely used WordPress plugin increases the risk of future exploitation. The lack of a patch at the time of disclosure necessitates immediate mitigation steps by administrators.
Potential Impact
The primary impact of CVE-2024-1242 is the compromise of confidentiality and integrity of user data and site content. Successful exploitation allows attackers to execute arbitrary JavaScript in the context of the affected website, enabling session hijacking, credential theft, defacement, or unauthorized actions such as privilege escalation or data manipulation. This can erode user trust, damage brand reputation, and lead to regulatory compliance issues if sensitive data is exposed. Since the vulnerability requires contributor-level access, insider threats or compromised contributor accounts pose significant risks. The scope includes all websites using the vulnerable plugin versions, which could be substantial given Elementor's popularity. Although availability is not directly impacted, secondary effects such as site defacement or malicious redirects could disrupt normal operations. Organizations with large user bases or handling sensitive information are particularly vulnerable to reputational and operational damage.
Mitigation Recommendations
Organizations should immediately audit and restrict contributor and higher-level user privileges to trusted personnel only, minimizing the risk of malicious script injection. Until an official patch is released, implement strict input validation and output encoding on all user-supplied content, especially for the button onclick attribute, to neutralize script tags and event handlers. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious payloads targeting this vulnerability. Monitor logs and user activity for unusual script injections or modifications to pages containing buttons. Educate content contributors about safe content practices and the risks of injecting scripts. Once available, promptly update the Premium Addons for Elementor plugin to a patched version. Additionally, consider deploying Content Security Policy (CSP) headers to restrict execution of unauthorized scripts and reduce the impact of potential XSS attacks.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2024-02-05T22:45:12.400Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6d27b7ef31ef0b56e699
Added to database: 2/25/2026, 9:44:07 PM
Last enriched: 2/26/2026, 9:23:36 AM
Last updated: 2/26/2026, 11:23:58 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-64999: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Checkmk GmbH Checkmk
HighCVE-2026-28138: Deserialization of Untrusted Data in Stylemix uListing
HighCVE-2026-28136: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in VeronaLabs WP SMS
HighCVE-2026-28132: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in villatheme WooCommerce Photo Reviews
HighCVE-2026-28131: Insertion of Sensitive Information Into Sent Data in WPVibes Elementor Addon Elements
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.