CVE-2024-35688: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Jewel Theme Master Addons for Elementor
CVE-2024-35688 is a stored cross-site scripting (XSS) vulnerability in the Jewel Theme Master Addons for Elementor plugin, affecting versions up to 2. 0. 5. 9. The vulnerability arises from improper neutralization of input during web page generation, allowing an attacker with low privileges and requiring user interaction to potentially execute malicious scripts in a context where the plugin is used. The CVSS score is 6. 5, indicating a medium severity level. No official patch or remediation guidance has been provided by the vendor at this time.
AI Analysis
Technical Summary
This vulnerability, identified as CVE-2024-35688, is a CWE-79 type stored cross-site scripting (XSS) issue in the Master Addons for Elementor plugin by Jewel Theme. It affects versions up to 2.0.5.9 and allows improper neutralization of input during web page generation. The vulnerability requires low privileges and user interaction but can lead to a complete security context compromise (scope changed). The CVSS 3.1 vector is AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L, reflecting network attack vector, low attack complexity, low privileges required, user interaction needed, scope changed, and low impact on confidentiality, integrity, and availability.
Potential Impact
An attacker with low privileges who can trick a user into interacting with malicious content may execute stored XSS attacks, potentially leading to partial compromise of confidentiality, integrity, and availability within the affected scope. This could allow execution of arbitrary scripts in the context of the affected web application, impacting users who interact with the malicious payload.
Mitigation Recommendations
No official patch or remediation guidance is currently available from the vendor. Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Until a fix is released, users should consider limiting exposure by restricting plugin usage to trusted users and monitoring for suspicious activity related to stored XSS. Avoid enabling untrusted input in contexts rendered by the plugin.
CVE-2024-35688: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Jewel Theme Master Addons for Elementor
Description
CVE-2024-35688 is a stored cross-site scripting (XSS) vulnerability in the Jewel Theme Master Addons for Elementor plugin, affecting versions up to 2. 0. 5. 9. The vulnerability arises from improper neutralization of input during web page generation, allowing an attacker with low privileges and requiring user interaction to potentially execute malicious scripts in a context where the plugin is used. The CVSS score is 6. 5, indicating a medium severity level. No official patch or remediation guidance has been provided by the vendor at this time.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
This vulnerability, identified as CVE-2024-35688, is a CWE-79 type stored cross-site scripting (XSS) issue in the Master Addons for Elementor plugin by Jewel Theme. It affects versions up to 2.0.5.9 and allows improper neutralization of input during web page generation. The vulnerability requires low privileges and user interaction but can lead to a complete security context compromise (scope changed). The CVSS 3.1 vector is AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L, reflecting network attack vector, low attack complexity, low privileges required, user interaction needed, scope changed, and low impact on confidentiality, integrity, and availability.
Potential Impact
An attacker with low privileges who can trick a user into interacting with malicious content may execute stored XSS attacks, potentially leading to partial compromise of confidentiality, integrity, and availability within the affected scope. This could allow execution of arbitrary scripts in the context of the affected web application, impacting users who interact with the malicious payload.
Mitigation Recommendations
No official patch or remediation guidance is currently available from the vendor. Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Until a fix is released, users should consider limiting exposure by restricting plugin usage to trusted users and monitoring for suspicious activity related to stored XSS. Avoid enabling untrusted input in contexts rendered by the plugin.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Patchstack
- Date Reserved
- 2024-05-17T10:08:56.848Z
- Cvss Version
- 3.1
- State
- PUBLISHED
- Remediation Level
- null
Threat ID: 69f16577cbff5d86104ae120
Added to database: 4/29/2026, 1:57:11 AM
Last enriched: 4/29/2026, 3:16:51 AM
Last updated: 4/29/2026, 6:04:30 AM
Views: 2
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.