CVE-2024-13699: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in qodeinteractive Qi Addons For Elementor
CVE-2024-13699 is a stored cross-site scripting (XSS) vulnerability in the Qi Addons For Elementor WordPress plugin affecting all versions up to 1. 8. 7. Authenticated users with Contributor-level access or higher can exploit insufficient input sanitization of the 'cursor' parameter to inject malicious scripts. These scripts execute whenever any user views the compromised page, potentially leading to session hijacking, defacement, or further attacks. Partial patches were introduced in versions 1. 8. 5 through 1. 8. 7 but do not fully mitigate the issue.
AI Analysis
Technical Summary
CVE-2024-13699 is a stored cross-site scripting vulnerability classified under CWE-79 affecting the Qi Addons For Elementor plugin for WordPress. This plugin, widely used to enhance Elementor page builder functionality, suffers from improper neutralization of input during web page generation. Specifically, the 'cursor' parameter is not adequately sanitized or escaped before being rendered, allowing authenticated users with Contributor-level access or higher to inject arbitrary JavaScript code. When other users visit the affected pages, the malicious scripts execute in their browsers, potentially compromising session tokens, redirecting users, or performing unauthorized actions. The vulnerability affects all versions up to and including 1.8.7, with partial patches introduced in versions 1.8.5 to 1.8.7 that do not fully resolve the issue. Exploitation requires authenticated access but no user interaction beyond viewing the infected page. The CVSS 3.1 score of 6.4 reflects a medium severity due to the ease of exploitation within a limited privilege context and the potential for confidentiality and integrity impacts. No public exploits have been reported yet, but the vulnerability poses a significant risk to WordPress sites using this plugin, especially those with multiple contributors and public content. The vulnerability highlights the importance of rigorous input validation and output encoding in web applications, particularly in plugins that extend CMS functionality.
Potential Impact
The primary impact of CVE-2024-13699 is the compromise of confidentiality and integrity of user sessions and data on affected WordPress sites. Attackers with Contributor-level access can inject persistent malicious scripts that execute in the context of any user viewing the infected page, including administrators. This can lead to session hijacking, unauthorized actions performed on behalf of users, defacement, or distribution of malware. While availability is not directly impacted, the reputational damage and potential data breaches can be severe. Organizations relying on the Qi Addons For Elementor plugin face risks of unauthorized access escalation and data leakage. Since the vulnerability requires authenticated access, insider threats or compromised contributor accounts are primary vectors. The partial patches indicate that some risk remains even after updating to versions 1.8.5 through 1.8.7, necessitating further remediation. The widespread use of WordPress and this plugin means many websites globally could be affected, especially those with collaborative content creation workflows.
Mitigation Recommendations
1. Immediately update the Qi Addons For Elementor plugin to the latest version once a complete patch is released that fully addresses CVE-2024-13699. Monitor vendor advisories for updates beyond 1.8.7. 2. Until a full patch is available, restrict Contributor-level access to trusted users only and audit existing contributor accounts for suspicious activity. 3. Implement web application firewall (WAF) rules to detect and block suspicious payloads targeting the 'cursor' parameter. 4. Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts on affected sites. 5. Conduct manual code reviews or use security scanning tools to identify and sanitize inputs related to the 'cursor' parameter in custom or third-party code. 6. Educate site administrators and contributors about the risks of XSS and safe content management practices. 7. Regularly backup website data and monitor logs for unusual behavior indicative of exploitation attempts. 8. Consider isolating or sandboxing user-generated content to reduce the impact of potential script injections. These steps go beyond generic advice by focusing on access control, layered defenses, and proactive monitoring specific to this vulnerability's characteristics.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Netherlands, India, Brazil, Japan, South Korea
CVE-2024-13699: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in qodeinteractive Qi Addons For Elementor
Description
CVE-2024-13699 is a stored cross-site scripting (XSS) vulnerability in the Qi Addons For Elementor WordPress plugin affecting all versions up to 1. 8. 7. Authenticated users with Contributor-level access or higher can exploit insufficient input sanitization of the 'cursor' parameter to inject malicious scripts. These scripts execute whenever any user views the compromised page, potentially leading to session hijacking, defacement, or further attacks. Partial patches were introduced in versions 1. 8. 5 through 1. 8. 7 but do not fully mitigate the issue.
AI-Powered Analysis
Technical Analysis
CVE-2024-13699 is a stored cross-site scripting vulnerability classified under CWE-79 affecting the Qi Addons For Elementor plugin for WordPress. This plugin, widely used to enhance Elementor page builder functionality, suffers from improper neutralization of input during web page generation. Specifically, the 'cursor' parameter is not adequately sanitized or escaped before being rendered, allowing authenticated users with Contributor-level access or higher to inject arbitrary JavaScript code. When other users visit the affected pages, the malicious scripts execute in their browsers, potentially compromising session tokens, redirecting users, or performing unauthorized actions. The vulnerability affects all versions up to and including 1.8.7, with partial patches introduced in versions 1.8.5 to 1.8.7 that do not fully resolve the issue. Exploitation requires authenticated access but no user interaction beyond viewing the infected page. The CVSS 3.1 score of 6.4 reflects a medium severity due to the ease of exploitation within a limited privilege context and the potential for confidentiality and integrity impacts. No public exploits have been reported yet, but the vulnerability poses a significant risk to WordPress sites using this plugin, especially those with multiple contributors and public content. The vulnerability highlights the importance of rigorous input validation and output encoding in web applications, particularly in plugins that extend CMS functionality.
Potential Impact
The primary impact of CVE-2024-13699 is the compromise of confidentiality and integrity of user sessions and data on affected WordPress sites. Attackers with Contributor-level access can inject persistent malicious scripts that execute in the context of any user viewing the infected page, including administrators. This can lead to session hijacking, unauthorized actions performed on behalf of users, defacement, or distribution of malware. While availability is not directly impacted, the reputational damage and potential data breaches can be severe. Organizations relying on the Qi Addons For Elementor plugin face risks of unauthorized access escalation and data leakage. Since the vulnerability requires authenticated access, insider threats or compromised contributor accounts are primary vectors. The partial patches indicate that some risk remains even after updating to versions 1.8.5 through 1.8.7, necessitating further remediation. The widespread use of WordPress and this plugin means many websites globally could be affected, especially those with collaborative content creation workflows.
Mitigation Recommendations
1. Immediately update the Qi Addons For Elementor plugin to the latest version once a complete patch is released that fully addresses CVE-2024-13699. Monitor vendor advisories for updates beyond 1.8.7. 2. Until a full patch is available, restrict Contributor-level access to trusted users only and audit existing contributor accounts for suspicious activity. 3. Implement web application firewall (WAF) rules to detect and block suspicious payloads targeting the 'cursor' parameter. 4. Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts on affected sites. 5. Conduct manual code reviews or use security scanning tools to identify and sanitize inputs related to the 'cursor' parameter in custom or third-party code. 6. Educate site administrators and contributors about the risks of XSS and safe content management practices. 7. Regularly backup website data and monitor logs for unusual behavior indicative of exploitation attempts. 8. Consider isolating or sandboxing user-generated content to reduce the impact of potential script injections. These steps go beyond generic advice by focusing on access control, layered defenses, and proactive monitoring specific to this vulnerability's characteristics.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-01-24T04:04:54.659Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6e69b7ef31ef0b5a02da
Added to database: 2/25/2026, 9:49:29 PM
Last enriched: 2/25/2026, 10:45:17 PM
Last updated: 2/26/2026, 7:19:54 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25191: Uncontrolled Search Path Element in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-23703: Incorrect default permissions in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-1311: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in bearsthemes Worry Proof Backup
HighFinding Signal in the Noise: Lessons Learned Running a Honeypot with AI Assistance [Guest Diary], (Tue, Feb 24th)
MediumCVE-2026-2506: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motahar1 EM Cost Calculator
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.