Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-3134: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in litonice13 Master Addons – Free Widgets, Hover Effects, Toggle, Conditions, Animations for Elementor

0
Medium
VulnerabilityCVE-2024-3134cvecve-2024-3134cwe-80
Published: Thu May 16 2024 (05/16/2024, 21:30:55 UTC)
Source: CVE Database V5
Vendor/Project: litonice13
Product: Master Addons – Free Widgets, Hover Effects, Toggle, Conditions, Animations for Elementor

Description

CVE-2024-3134 is a stored Cross-Site Scripting (XSS) vulnerability in the WordPress plugin 'Master Addons – Free Widgets, Hover Effects, Toggle, Conditions, Animations for Elementor' by litonice13. The flaw exists in all versions up to 2. 0. 6. 0 and arises from improper sanitization and escaping of the title_html_tag attribute. Authenticated users with contributor-level access or higher can inject malicious scripts that execute whenever any user views the compromised page. The vulnerability does not require user interaction but does require authentication with at least contributor privileges. The CVSS score is 6. 4 (medium severity), reflecting a network attack vector with low attack complexity and partial impact on confidentiality and integrity. No known exploits are currently reported in the wild.

AI-Powered Analysis

AILast updated: 02/26/2026, 06:03:57 UTC

Technical Analysis

CVE-2024-3134 is a stored Cross-Site Scripting (XSS) vulnerability classified under CWE-80 affecting the 'Master Addons – Free Widgets, Hover Effects, Toggle, Conditions, Animations for Elementor' WordPress plugin developed by litonice13. This plugin extends Elementor with additional widgets and effects and is widely used in WordPress sites for enhanced UI/UX features. The vulnerability stems from insufficient input sanitization and output escaping of the title_html_tag attribute, which allows authenticated users with contributor or higher privileges to inject arbitrary JavaScript code into pages. Because the malicious script is stored persistently, it executes automatically whenever any user accesses the infected page, potentially compromising user sessions, stealing cookies, or performing unauthorized actions on behalf of users. The attack vector is network-based with low complexity, requiring no user interaction but does require authenticated access, which limits exploitation to insiders or compromised accounts. The vulnerability impacts confidentiality and integrity but does not affect availability. Although no public exploits have been reported yet, the widespread use of this plugin and the commonality of contributor-level accounts in WordPress environments make this a significant risk. The vulnerability affects all versions up to and including 2.0.6.0. No official patches were linked at the time of disclosure, so mitigation relies on access control and input validation measures until updates are available.

Potential Impact

The primary impact of CVE-2024-3134 is the potential compromise of user confidentiality and integrity on WordPress sites using the affected plugin. Attackers with contributor-level access can inject persistent malicious scripts that execute in the browsers of site visitors and administrators. This can lead to session hijacking, theft of authentication tokens, unauthorized actions performed with victim privileges, defacement, or distribution of malware. Since the vulnerability requires authenticated access, the risk is higher in environments with weak access controls or where contributor accounts are frequently created or compromised. The scope includes all users who visit the infected pages, potentially including site administrators, increasing the risk of privilege escalation or site takeover. Although availability is not directly impacted, the indirect consequences of exploitation could lead to site downtime or loss of user trust. Organizations relying on this plugin for site functionality face reputational damage and potential regulatory compliance issues if user data is exposed. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially as proof-of-concept exploits could emerge.

Mitigation Recommendations

1. Immediately restrict contributor-level access to trusted users only and audit existing accounts for suspicious activity. 2. Apply the latest plugin updates as soon as they become available from the vendor to address the vulnerability. 3. Implement Web Application Firewall (WAF) rules to detect and block suspicious input patterns targeting the title_html_tag attribute. 4. Use security plugins that sanitize and escape user inputs and outputs globally to provide an additional layer of defense. 5. Conduct regular security reviews and penetration testing focusing on user input handling in WordPress plugins. 6. Educate site administrators and contributors on secure content creation practices to avoid injection of malicious scripts. 7. Monitor site logs for unusual script injections or access patterns indicative of exploitation attempts. 8. Consider temporarily disabling or replacing the affected plugin with alternative solutions until a patch is confirmed. 9. Enforce Content Security Policy (CSP) headers to restrict execution of unauthorized scripts in browsers. 10. Backup site data regularly to enable quick recovery in case of compromise.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-04-01T14:22:48.500Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c8cb7ef31ef0b56626d

Added to database: 2/25/2026, 9:41:32 PM

Last enriched: 2/26/2026, 6:03:57 AM

Last updated: 2/26/2026, 11:18:16 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats