Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-1242: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in leap13 Premium Addons for Elementor

0
Medium
VulnerabilityCVE-2024-1242cvecve-2024-1242cwe-80
Published: Tue Feb 20 2024 (02/20/2024, 18:56:19 UTC)
Source: CVE Database V5
Vendor/Project: leap13
Product: Premium Addons for Elementor

Description

CVE-2024-1242 is a stored cross-site scripting (XSS) vulnerability in the Premium Addons for Elementor WordPress plugin, affecting all versions up to 4. 10. 18. The flaw arises from improper input sanitization and output escaping of the button onclick attribute, allowing authenticated users with contributor-level access or higher to inject malicious scripts. These scripts execute whenever any user views the compromised page, potentially leading to session hijacking, defacement, or unauthorized actions. The vulnerability has a CVSS score of 6. 4, indicating medium severity, with no known exploits in the wild currently. Mitigation requires updating the plugin once a patch is available or applying strict input validation and output encoding on user-supplied content. Organizations using this plugin should audit user roles and restrict contributor access to trusted users. Countries with significant WordPress usage and large web publishing sectors, such as the United States, Germany, United Kingdom, Canada, Australia, and India, are most at risk.

AI-Powered Analysis

AILast updated: 02/26/2026, 09:23:36 UTC

Technical Analysis

CVE-2024-1242 identifies a stored cross-site scripting (XSS) vulnerability in the Premium Addons for Elementor plugin for WordPress, specifically in all versions up to and including 4.10.18. The vulnerability stems from improper neutralization of script-related HTML tags (CWE-80) within the button onclick attribute, where insufficient input sanitization and output escaping allow malicious JavaScript code injection. Authenticated attackers with contributor or higher privileges can exploit this by injecting arbitrary scripts into pages. These scripts execute in the context of any user who views the infected page, potentially compromising user sessions, stealing cookies, or performing unauthorized actions on behalf of users. The vulnerability does not require user interaction beyond page access and has a CVSS 3.1 base score of 6.4, reflecting medium severity. The attack vector is network-based with low attack complexity, requiring privileges but no user interaction, and impacts confidentiality and integrity with no direct availability impact. No public exploits are currently known, but the vulnerability's presence in a widely used WordPress plugin increases the risk of future exploitation. The lack of a patch at the time of disclosure necessitates immediate mitigation steps by administrators.

Potential Impact

The primary impact of CVE-2024-1242 is the compromise of confidentiality and integrity of user data and site content. Successful exploitation allows attackers to execute arbitrary JavaScript in the context of the affected website, enabling session hijacking, credential theft, defacement, or unauthorized actions such as privilege escalation or data manipulation. This can erode user trust, damage brand reputation, and lead to regulatory compliance issues if sensitive data is exposed. Since the vulnerability requires contributor-level access, insider threats or compromised contributor accounts pose significant risks. The scope includes all websites using the vulnerable plugin versions, which could be substantial given Elementor's popularity. Although availability is not directly impacted, secondary effects such as site defacement or malicious redirects could disrupt normal operations. Organizations with large user bases or handling sensitive information are particularly vulnerable to reputational and operational damage.

Mitigation Recommendations

Organizations should immediately audit and restrict contributor and higher-level user privileges to trusted personnel only, minimizing the risk of malicious script injection. Until an official patch is released, implement strict input validation and output encoding on all user-supplied content, especially for the button onclick attribute, to neutralize script tags and event handlers. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious payloads targeting this vulnerability. Monitor logs and user activity for unusual script injections or modifications to pages containing buttons. Educate content contributors about safe content practices and the risks of injecting scripts. Once available, promptly update the Premium Addons for Elementor plugin to a patched version. Additionally, consider deploying Content Security Policy (CSP) headers to restrict execution of unauthorized scripts and reduce the impact of potential XSS attacks.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-02-05T22:45:12.400Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d27b7ef31ef0b56e699

Added to database: 2/25/2026, 9:44:07 PM

Last enriched: 2/26/2026, 9:23:36 AM

Last updated: 2/26/2026, 11:23:58 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats