Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-3885: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in leap13 Premium Addons for Elementor

0
Medium
VulnerabilityCVE-2024-3885cvecve-2024-3885cwe-79
Published: Thu May 02 2024 (05/02/2024, 16:52:00 UTC)
Source: CVE Database V5
Vendor/Project: leap13
Product: Premium Addons for Elementor

Description

CVE-2024-3885 is a stored cross-site scripting (XSS) vulnerability in the Premium Addons for Elementor WordPress plugin, affecting all versions up to 4. 10. 28. The flaw arises from improper input sanitization and output escaping of the 'subcontainer' value parameter, allowing authenticated users with contributor-level access or higher to inject malicious scripts. These scripts execute whenever any user views the compromised page, potentially leading to session hijacking, defacement, or further attacks. The vulnerability has a CVSS score of 6. 4, indicating medium severity, and does not require user interaction but does require authenticated access. No known exploits are currently reported in the wild. Organizations using this plugin should prioritize patching or applying mitigations to prevent exploitation. Countries with significant WordPress usage and high adoption of Elementor plugins, including the United States, Germany, United Kingdom, Canada, Australia, and India, are most at risk.

AI-Powered Analysis

AILast updated: 02/26/2026, 06:28:12 UTC

Technical Analysis

CVE-2024-3885 is a stored cross-site scripting vulnerability identified in the Premium Addons for Elementor plugin for WordPress, a widely used page builder enhancement tool. The vulnerability stems from improper neutralization of input during web page generation, specifically involving the 'subcontainer' value parameter. Due to insufficient input sanitization and lack of proper output escaping, authenticated users with contributor or higher privileges can inject arbitrary JavaScript code into pages. This malicious code is stored persistently and executed in the context of any user who accesses the infected page, potentially compromising user sessions, stealing cookies, or performing unauthorized actions on behalf of users. The vulnerability affects all versions up to and including 4.10.28. The CVSS 3.1 base score is 6.4, reflecting a medium severity with network attack vector, low attack complexity, requiring privileges but no user interaction, and impacting confidentiality and integrity with no availability impact. Although no exploits are currently known in the wild, the vulnerability's presence in a popular WordPress plugin makes it a significant risk. The scope is broad as it affects all installations of the vulnerable plugin versions, and the exploitation requires only contributor-level access, which is commonly granted in multi-author WordPress sites. The vulnerability was published on May 2, 2024, and assigned by Wordfence. No official patch links are provided yet, indicating that mitigation may require manual intervention or plugin updates once available.

Potential Impact

The primary impact of this vulnerability is the compromise of confidentiality and integrity of affected WordPress sites using the Premium Addons for Elementor plugin. Attackers with contributor access can inject persistent malicious scripts that execute in the browsers of site visitors and administrators, potentially leading to session hijacking, credential theft, defacement, unauthorized actions, or distribution of malware. This can damage organizational reputation, lead to data breaches, and facilitate further attacks within the network. Since contributor-level access is often granted to multiple users in collaborative environments, the attack surface is significant. The vulnerability does not impact availability directly but can indirectly cause service disruption through defacement or administrative lockout. Organizations relying on this plugin for website functionality or marketing may face operational and financial consequences if exploited. The lack of known exploits in the wild suggests limited immediate risk but also highlights the importance of proactive remediation before attackers develop weaponized exploits.

Mitigation Recommendations

Organizations should immediately audit user roles and permissions to ensure that contributor-level access is strictly controlled and limited to trusted users. Until an official patch is released, consider temporarily disabling or removing the Premium Addons for Elementor plugin if feasible. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious input patterns targeting the 'subcontainer' parameter. Implement Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. Regularly monitor logs for unusual activity related to page content changes or script injections. Educate site administrators and contributors about the risks of injecting untrusted content. Once a vendor patch is available, apply it promptly and verify that input sanitization and output escaping are correctly enforced. Additionally, conduct security scans and penetration tests focusing on XSS vulnerabilities in WordPress environments. Maintain up-to-date backups to enable rapid recovery if compromise occurs.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-04-16T15:30:28.569Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c9fb7ef31ef0b566ed9

Added to database: 2/25/2026, 9:41:51 PM

Last enriched: 2/26/2026, 6:28:12 AM

Last updated: 2/26/2026, 9:42:47 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats