CVE-2024-4440: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in xpro 140+ Widgets | Best Addons For Elementor – FREE
CVE-2024-4440 is a stored cross-site scripting (XSS) vulnerability in the WordPress plugin '140+ Widgets | Best Addons For Elementor – FREE' affecting all versions up to 1. 4. 3. The flaw arises from improper input sanitization and output escaping of user-supplied attributes in the plugin's widgets. Authenticated attackers with contributor-level or higher privileges can inject malicious scripts into pages, which execute when other users view the infected content. This vulnerability does not require user interaction but does require authentication with at least contributor rights. The CVSS score is 6. 4 (medium severity), reflecting limited confidentiality and integrity impact but no availability impact. No known exploits are currently reported in the wild. Organizations using this plugin on WordPress sites should prioritize patching or mitigating this issue to prevent potential script injection attacks that could lead to session hijacking, defacement, or further exploitation.
AI Analysis
Technical Summary
CVE-2024-4440 is a stored cross-site scripting vulnerability classified under CWE-79, found in the '140+ Widgets | Best Addons For Elementor – FREE' WordPress plugin developed by xpro. This plugin provides over 140 widgets for the Elementor page builder, widely used to enhance WordPress site functionality and design. The vulnerability exists due to insufficient neutralization of user input during web page generation, specifically a lack of proper sanitization and escaping of user-supplied attributes within the plugin's widgets. Authenticated users with contributor-level access or higher can exploit this flaw by injecting arbitrary JavaScript code into pages or posts through the plugin's widget interface. When other users, including administrators or editors, access the compromised page, the malicious script executes in their browsers. This can lead to session hijacking, privilege escalation, or unauthorized actions performed on behalf of the victim. The vulnerability affects all versions up to and including 1.4.3, with no patch currently linked in the provided data. The CVSS 3.1 base score is 6.4, indicating medium severity, with attack vector network (AV:N), low attack complexity (AC:L), privileges required (PR:L), no user interaction (UI:N), scope changed (S:C), and partial impact on confidentiality and integrity (C:L/I:L/A:N). No known exploits have been reported in the wild as of the publication date. Due to the plugin's popularity among WordPress users, this vulnerability poses a significant risk to websites using it without proper mitigation.
Potential Impact
The primary impact of CVE-2024-4440 is the potential for attackers with contributor-level access to inject persistent malicious scripts into WordPress pages or posts. This can compromise the confidentiality and integrity of user sessions and data by enabling session hijacking, theft of cookies or credentials, and unauthorized actions performed under the victim's identity. Although availability is not directly affected, the injected scripts could be used for defacement or redirecting users to malicious sites, damaging the organization's reputation. The vulnerability's exploitation requires authenticated access, which limits the attack surface but remains significant since contributor-level accounts are common in collaborative WordPress environments. Organizations running websites with this plugin are at risk of targeted attacks, especially if they allow external contributors or have weak account management. The scope of affected systems is broad due to the plugin's widespread use in WordPress sites globally, increasing the potential for large-scale exploitation if weaponized. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, as attackers may develop exploits rapidly once the vulnerability is public.
Mitigation Recommendations
To mitigate CVE-2024-4440, organizations should first check for and apply any available updates or patches from the plugin vendor as soon as they are released. In the absence of an official patch, administrators should consider temporarily disabling or removing the vulnerable plugin to eliminate the attack vector. Restrict contributor-level access strictly to trusted users and review user permissions to minimize the number of accounts that can exploit this vulnerability. Implement Web Application Firewall (WAF) rules to detect and block suspicious script injection attempts targeting the plugin's widget inputs. Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in browsers. Regularly audit and sanitize existing content created via the plugin to identify and remove any injected malicious scripts. Monitor website logs and user activity for signs of exploitation or unusual behavior. Educate content contributors about secure input practices and the risks of injecting untrusted code. Finally, consider alternative plugins with better security track records if timely patching is not feasible.
Affected Countries
United States, United Kingdom, Germany, Canada, Australia, India, France, Brazil, Netherlands, Japan, Italy, Spain
CVE-2024-4440: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in xpro 140+ Widgets | Best Addons For Elementor – FREE
Description
CVE-2024-4440 is a stored cross-site scripting (XSS) vulnerability in the WordPress plugin '140+ Widgets | Best Addons For Elementor – FREE' affecting all versions up to 1. 4. 3. The flaw arises from improper input sanitization and output escaping of user-supplied attributes in the plugin's widgets. Authenticated attackers with contributor-level or higher privileges can inject malicious scripts into pages, which execute when other users view the infected content. This vulnerability does not require user interaction but does require authentication with at least contributor rights. The CVSS score is 6. 4 (medium severity), reflecting limited confidentiality and integrity impact but no availability impact. No known exploits are currently reported in the wild. Organizations using this plugin on WordPress sites should prioritize patching or mitigating this issue to prevent potential script injection attacks that could lead to session hijacking, defacement, or further exploitation.
AI-Powered Analysis
Technical Analysis
CVE-2024-4440 is a stored cross-site scripting vulnerability classified under CWE-79, found in the '140+ Widgets | Best Addons For Elementor – FREE' WordPress plugin developed by xpro. This plugin provides over 140 widgets for the Elementor page builder, widely used to enhance WordPress site functionality and design. The vulnerability exists due to insufficient neutralization of user input during web page generation, specifically a lack of proper sanitization and escaping of user-supplied attributes within the plugin's widgets. Authenticated users with contributor-level access or higher can exploit this flaw by injecting arbitrary JavaScript code into pages or posts through the plugin's widget interface. When other users, including administrators or editors, access the compromised page, the malicious script executes in their browsers. This can lead to session hijacking, privilege escalation, or unauthorized actions performed on behalf of the victim. The vulnerability affects all versions up to and including 1.4.3, with no patch currently linked in the provided data. The CVSS 3.1 base score is 6.4, indicating medium severity, with attack vector network (AV:N), low attack complexity (AC:L), privileges required (PR:L), no user interaction (UI:N), scope changed (S:C), and partial impact on confidentiality and integrity (C:L/I:L/A:N). No known exploits have been reported in the wild as of the publication date. Due to the plugin's popularity among WordPress users, this vulnerability poses a significant risk to websites using it without proper mitigation.
Potential Impact
The primary impact of CVE-2024-4440 is the potential for attackers with contributor-level access to inject persistent malicious scripts into WordPress pages or posts. This can compromise the confidentiality and integrity of user sessions and data by enabling session hijacking, theft of cookies or credentials, and unauthorized actions performed under the victim's identity. Although availability is not directly affected, the injected scripts could be used for defacement or redirecting users to malicious sites, damaging the organization's reputation. The vulnerability's exploitation requires authenticated access, which limits the attack surface but remains significant since contributor-level accounts are common in collaborative WordPress environments. Organizations running websites with this plugin are at risk of targeted attacks, especially if they allow external contributors or have weak account management. The scope of affected systems is broad due to the plugin's widespread use in WordPress sites globally, increasing the potential for large-scale exploitation if weaponized. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, as attackers may develop exploits rapidly once the vulnerability is public.
Mitigation Recommendations
To mitigate CVE-2024-4440, organizations should first check for and apply any available updates or patches from the plugin vendor as soon as they are released. In the absence of an official patch, administrators should consider temporarily disabling or removing the vulnerable plugin to eliminate the attack vector. Restrict contributor-level access strictly to trusted users and review user permissions to minimize the number of accounts that can exploit this vulnerability. Implement Web Application Firewall (WAF) rules to detect and block suspicious script injection attempts targeting the plugin's widget inputs. Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in browsers. Regularly audit and sanitize existing content created via the plugin to identify and remove any injected malicious scripts. Monitor website logs and user activity for signs of exploitation or unusual behavior. Educate content contributors about secure input practices and the risks of injecting untrusted code. Finally, consider alternative plugins with better security track records if timely patching is not feasible.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2024-05-02T17:31:31.757Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6b8cb7ef31ef0b5568ab
Added to database: 2/25/2026, 9:37:16 PM
Last enriched: 2/26/2026, 12:44:24 AM
Last updated: 2/26/2026, 6:18:20 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25191: Uncontrolled Search Path Element in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-23703: Incorrect default permissions in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-1311: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in bearsthemes Worry Proof Backup
HighFinding Signal in the Noise: Lessons Learned Running a Honeypot with AI Assistance [Guest Diary], (Tue, Feb 24th)
MediumCVE-2026-2506: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motahar1 EM Cost Calculator
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.