Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-3890: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in thehappymonster Happy Addons for Elementor

0
Medium
VulnerabilityCVE-2024-3890cvecve-2024-3890cwe-79
Published: Fri Apr 26 2024 (04/26/2024, 07:28:18 UTC)
Source: CVE Database V5
Vendor/Project: thehappymonster
Product: Happy Addons for Elementor

Description

CVE-2024-3890 is a stored Cross-Site Scripting (XSS) vulnerability in the Happy Addons for Elementor WordPress plugin, specifically via the Calendly widget. It affects all versions up to and including 3. 10. 5. Authenticated users with contributor-level access or higher can inject malicious scripts that execute when other users view the compromised pages. The vulnerability arises from insufficient input sanitization and output escaping of user-supplied attributes. Exploitation does not require user interaction but does require authentication with at least contributor privileges. The CVSS score is 6. 4 (medium severity), reflecting the potential for limited confidentiality and integrity impact without availability loss. No known exploits are currently reported in the wild.

AI-Powered Analysis

AILast updated: 02/26/2026, 06:29:47 UTC

Technical Analysis

CVE-2024-3890 identifies a stored Cross-Site Scripting (XSS) vulnerability in the Happy Addons for Elementor plugin for WordPress, specifically through the Calendly widget component. This vulnerability exists in all versions up to 3.10.5 due to improper neutralization of input during web page generation, classified under CWE-79. The root cause is insufficient sanitization and escaping of user-supplied attributes, allowing authenticated users with contributor-level or higher privileges to inject arbitrary JavaScript code into pages. When other users access these pages, the injected scripts execute in their browsers, potentially leading to session hijacking, privilege escalation, or unauthorized actions performed on behalf of the victim. The vulnerability requires no user interaction beyond visiting the compromised page but does require authentication with contributor or higher privileges, limiting exploitation to insiders or compromised accounts. The CVSS 3.1 base score is 6.4, indicating a medium severity with network attack vector, low attack complexity, and privileges required. The scope is changed (S:C), meaning the vulnerability can affect resources beyond the vulnerable component. No public exploits are currently known, but the risk remains significant given the widespread use of Elementor and its add-ons in WordPress sites. The vulnerability highlights the importance of proper input validation and output encoding in web applications, especially those that allow user-generated content or attributes.

Potential Impact

The impact of CVE-2024-3890 on organizations worldwide includes potential compromise of user sessions, unauthorized actions performed with victim privileges, defacement of websites, and possible data leakage through malicious scripts. Since the vulnerability is stored XSS, injected scripts persist and affect all users who visit the compromised pages, amplifying the attack surface. Organizations using the Happy Addons for Elementor plugin risk reputational damage, loss of customer trust, and potential regulatory consequences if user data is exposed or manipulated. The requirement for contributor-level access limits exploitation to insiders or attackers who have already compromised accounts, but this does not eliminate risk, especially in environments with multiple content editors or weak access controls. The vulnerability does not impact availability directly but can indirectly cause service disruptions if exploited to inject malicious payloads or redirect users. Given the popularity of WordPress and Elementor, many websites globally could be affected, including corporate, e-commerce, and media sites, increasing the potential scale of impact.

Mitigation Recommendations

To mitigate CVE-2024-3890, organizations should immediately update the Happy Addons for Elementor plugin to a patched version once available. Until a patch is released, restrict contributor-level and higher access to trusted users only, and audit existing user accounts for suspicious activity. Implement Web Application Firewall (WAF) rules to detect and block malicious payloads targeting the Calendly widget or suspicious script injections. Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts on affected pages. Regularly scan WordPress sites for XSS vulnerabilities and malicious content injections using specialized security plugins or external scanning tools. Educate content editors and administrators about the risks of injecting untrusted content and enforce strict input validation policies. Monitor logs for unusual activity related to page edits or script injections. Finally, consider isolating or disabling the Calendly widget feature if it is not essential, reducing the attack surface.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-04-16T17:06:36.698Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c9fb7ef31ef0b566eed

Added to database: 2/25/2026, 9:41:51 PM

Last enriched: 2/26/2026, 6:29:47 AM

Last updated: 2/26/2026, 11:20:49 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats