Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-13699: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in qodeinteractive Qi Addons For Elementor

0
Medium
VulnerabilityCVE-2024-13699cvecve-2024-13699cwe-79
Published: Tue Feb 04 2025 (02/04/2025, 12:22:21 UTC)
Source: CVE Database V5
Vendor/Project: qodeinteractive
Product: Qi Addons For Elementor

Description

CVE-2024-13699 is a stored cross-site scripting (XSS) vulnerability in the Qi Addons For Elementor WordPress plugin affecting all versions up to 1. 8. 7. Authenticated users with Contributor-level access or higher can exploit insufficient input sanitization of the 'cursor' parameter to inject malicious scripts. These scripts execute whenever any user views the compromised page, potentially leading to session hijacking, defacement, or further attacks. Partial patches were introduced in versions 1. 8. 5 through 1. 8. 7 but do not fully mitigate the issue.

AI-Powered Analysis

AILast updated: 02/25/2026, 22:45:17 UTC

Technical Analysis

CVE-2024-13699 is a stored cross-site scripting vulnerability classified under CWE-79 affecting the Qi Addons For Elementor plugin for WordPress. This plugin, widely used to enhance Elementor page builder functionality, suffers from improper neutralization of input during web page generation. Specifically, the 'cursor' parameter is not adequately sanitized or escaped before being rendered, allowing authenticated users with Contributor-level access or higher to inject arbitrary JavaScript code. When other users visit the affected pages, the malicious scripts execute in their browsers, potentially compromising session tokens, redirecting users, or performing unauthorized actions. The vulnerability affects all versions up to and including 1.8.7, with partial patches introduced in versions 1.8.5 to 1.8.7 that do not fully resolve the issue. Exploitation requires authenticated access but no user interaction beyond viewing the infected page. The CVSS 3.1 score of 6.4 reflects a medium severity due to the ease of exploitation within a limited privilege context and the potential for confidentiality and integrity impacts. No public exploits have been reported yet, but the vulnerability poses a significant risk to WordPress sites using this plugin, especially those with multiple contributors and public content. The vulnerability highlights the importance of rigorous input validation and output encoding in web applications, particularly in plugins that extend CMS functionality.

Potential Impact

The primary impact of CVE-2024-13699 is the compromise of confidentiality and integrity of user sessions and data on affected WordPress sites. Attackers with Contributor-level access can inject persistent malicious scripts that execute in the context of any user viewing the infected page, including administrators. This can lead to session hijacking, unauthorized actions performed on behalf of users, defacement, or distribution of malware. While availability is not directly impacted, the reputational damage and potential data breaches can be severe. Organizations relying on the Qi Addons For Elementor plugin face risks of unauthorized access escalation and data leakage. Since the vulnerability requires authenticated access, insider threats or compromised contributor accounts are primary vectors. The partial patches indicate that some risk remains even after updating to versions 1.8.5 through 1.8.7, necessitating further remediation. The widespread use of WordPress and this plugin means many websites globally could be affected, especially those with collaborative content creation workflows.

Mitigation Recommendations

1. Immediately update the Qi Addons For Elementor plugin to the latest version once a complete patch is released that fully addresses CVE-2024-13699. Monitor vendor advisories for updates beyond 1.8.7. 2. Until a full patch is available, restrict Contributor-level access to trusted users only and audit existing contributor accounts for suspicious activity. 3. Implement web application firewall (WAF) rules to detect and block suspicious payloads targeting the 'cursor' parameter. 4. Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts on affected sites. 5. Conduct manual code reviews or use security scanning tools to identify and sanitize inputs related to the 'cursor' parameter in custom or third-party code. 6. Educate site administrators and contributors about the risks of XSS and safe content management practices. 7. Regularly backup website data and monitor logs for unusual behavior indicative of exploitation attempts. 8. Consider isolating or sandboxing user-generated content to reduce the impact of potential script injections. These steps go beyond generic advice by focusing on access control, layered defenses, and proactive monitoring specific to this vulnerability's characteristics.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-01-24T04:04:54.659Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e69b7ef31ef0b5a02da

Added to database: 2/25/2026, 9:49:29 PM

Last enriched: 2/25/2026, 10:45:17 PM

Last updated: 2/26/2026, 7:19:54 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats