Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-4440: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in xpro 140+ Widgets | Best Addons For Elementor – FREE

0
Medium
VulnerabilityCVE-2024-4440cvecve-2024-4440cwe-79
Published: Tue May 14 2024 (05/14/2024, 09:33:31 UTC)
Source: CVE Database V5
Vendor/Project: xpro
Product: 140+ Widgets | Best Addons For Elementor – FREE

Description

CVE-2024-4440 is a stored cross-site scripting (XSS) vulnerability in the WordPress plugin '140+ Widgets | Best Addons For Elementor – FREE' affecting all versions up to 1. 4. 3. The flaw arises from improper input sanitization and output escaping of user-supplied attributes in the plugin's widgets. Authenticated attackers with contributor-level or higher privileges can inject malicious scripts into pages, which execute when other users view the infected content. This vulnerability does not require user interaction but does require authentication with at least contributor rights. The CVSS score is 6. 4 (medium severity), reflecting limited confidentiality and integrity impact but no availability impact. No known exploits are currently reported in the wild. Organizations using this plugin on WordPress sites should prioritize patching or mitigating this issue to prevent potential script injection attacks that could lead to session hijacking, defacement, or further exploitation.

AI-Powered Analysis

AILast updated: 02/26/2026, 00:44:24 UTC

Technical Analysis

CVE-2024-4440 is a stored cross-site scripting vulnerability classified under CWE-79, found in the '140+ Widgets | Best Addons For Elementor – FREE' WordPress plugin developed by xpro. This plugin provides over 140 widgets for the Elementor page builder, widely used to enhance WordPress site functionality and design. The vulnerability exists due to insufficient neutralization of user input during web page generation, specifically a lack of proper sanitization and escaping of user-supplied attributes within the plugin's widgets. Authenticated users with contributor-level access or higher can exploit this flaw by injecting arbitrary JavaScript code into pages or posts through the plugin's widget interface. When other users, including administrators or editors, access the compromised page, the malicious script executes in their browsers. This can lead to session hijacking, privilege escalation, or unauthorized actions performed on behalf of the victim. The vulnerability affects all versions up to and including 1.4.3, with no patch currently linked in the provided data. The CVSS 3.1 base score is 6.4, indicating medium severity, with attack vector network (AV:N), low attack complexity (AC:L), privileges required (PR:L), no user interaction (UI:N), scope changed (S:C), and partial impact on confidentiality and integrity (C:L/I:L/A:N). No known exploits have been reported in the wild as of the publication date. Due to the plugin's popularity among WordPress users, this vulnerability poses a significant risk to websites using it without proper mitigation.

Potential Impact

The primary impact of CVE-2024-4440 is the potential for attackers with contributor-level access to inject persistent malicious scripts into WordPress pages or posts. This can compromise the confidentiality and integrity of user sessions and data by enabling session hijacking, theft of cookies or credentials, and unauthorized actions performed under the victim's identity. Although availability is not directly affected, the injected scripts could be used for defacement or redirecting users to malicious sites, damaging the organization's reputation. The vulnerability's exploitation requires authenticated access, which limits the attack surface but remains significant since contributor-level accounts are common in collaborative WordPress environments. Organizations running websites with this plugin are at risk of targeted attacks, especially if they allow external contributors or have weak account management. The scope of affected systems is broad due to the plugin's widespread use in WordPress sites globally, increasing the potential for large-scale exploitation if weaponized. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, as attackers may develop exploits rapidly once the vulnerability is public.

Mitigation Recommendations

To mitigate CVE-2024-4440, organizations should first check for and apply any available updates or patches from the plugin vendor as soon as they are released. In the absence of an official patch, administrators should consider temporarily disabling or removing the vulnerable plugin to eliminate the attack vector. Restrict contributor-level access strictly to trusted users and review user permissions to minimize the number of accounts that can exploit this vulnerability. Implement Web Application Firewall (WAF) rules to detect and block suspicious script injection attempts targeting the plugin's widget inputs. Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in browsers. Regularly audit and sanitize existing content created via the plugin to identify and remove any injected malicious scripts. Monitor website logs and user activity for signs of exploitation or unusual behavior. Educate content contributors about secure input practices and the risks of injecting untrusted code. Finally, consider alternative plugins with better security track records if timely patching is not feasible.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-05-02T17:31:31.757Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6b8cb7ef31ef0b5568ab

Added to database: 2/25/2026, 9:37:16 PM

Last enriched: 2/26/2026, 12:44:24 AM

Last updated: 2/26/2026, 6:18:20 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats