Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-5086: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Essential Addons Essential Addons for Elementor Pro

0
Medium
VulnerabilityCVE-2024-5086cvecve-2024-5086cwe-79
Published: Wed May 29 2024 (05/29/2024, 07:33:52 UTC)
Source: CVE Database V5
Vendor/Project: Essential Addons
Product: Essential Addons for Elementor Pro

Description

CVE-2024-5086 is a stored cross-site scripting (XSS) vulnerability in the Essential Addons for Elementor Pro WordPress plugin, specifically in the Team Member Carousel widget. It affects all Pro versions up to 5. 8. 14 and allows authenticated users with contributor-level access or higher to inject malicious scripts. These scripts execute whenever any user views the compromised page, potentially leading to session hijacking, defacement, or unauthorized actions. The vulnerability arises from insufficient input sanitization and output escaping of user-supplied attributes. Exploitation does not require user interaction beyond visiting the affected page. The CVSS score is 6. 4 (medium severity), reflecting the need for authentication but the potential for significant impact on confidentiality and integrity. No known public exploits have been reported yet.

AI-Powered Analysis

AILast updated: 02/26/2026, 02:23:25 UTC

Technical Analysis

CVE-2024-5086 is a stored cross-site scripting (XSS) vulnerability classified under CWE-79, found in the Essential Addons for Elementor Pro WordPress plugin, widely used for enhancing Elementor page builder functionality. The flaw exists in the Team Member Carousel widget, where user-supplied input is not properly sanitized or escaped before being rendered on web pages. This allows attackers with contributor-level or higher privileges to inject arbitrary JavaScript code that is stored persistently and executed in the context of any user viewing the affected page. Because the vulnerability requires authenticated access, it limits exploitation to users who can contribute content, but the impact is significant as it can lead to session hijacking, privilege escalation, or defacement. The vulnerability affects all Pro versions up to and including 5.8.14. The CVSS 3.1 base score of 6.4 reflects a network attack vector with low attack complexity, requiring privileges but no user interaction, and impacts confidentiality and integrity with a scope change. No official patches or fixes have been linked yet, so mitigation relies on restricting contributor access, monitoring for suspicious activity, or disabling the vulnerable widget. Given the popularity of Elementor and its addons, this vulnerability poses a risk to many WordPress sites globally.

Potential Impact

The impact of CVE-2024-5086 is primarily on the confidentiality and integrity of affected WordPress sites using the Essential Addons for Elementor Pro plugin. Successful exploitation enables attackers with contributor-level access to inject malicious scripts that execute in the browsers of site visitors and administrators. This can lead to session hijacking, theft of sensitive information, unauthorized actions performed on behalf of users, and potential site defacement. Although availability is not directly impacted, the compromise of administrative sessions or user data can severely disrupt business operations and damage reputation. Organizations relying on this plugin for their websites, especially those with multiple contributors, face increased risk of insider threats or compromised contributor accounts being leveraged for attacks. The vulnerability's scope includes all sites running vulnerable versions, which could be substantial given Elementor's market penetration in the WordPress ecosystem. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, as attackers may develop exploits rapidly once details are public.

Mitigation Recommendations

To mitigate CVE-2024-5086, organizations should first verify if they are running Essential Addons for Elementor Pro versions up to 5.8.14 and plan to update to a patched version as soon as it becomes available. In the absence of an official patch, restrict contributor-level access to trusted users only, minimizing the risk of malicious script injection. Implement strict content review and moderation processes for user-generated content involving the Team Member Carousel widget. Disable or remove the vulnerable widget from pages if it is not essential. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious script injection attempts targeting this widget. Monitor website logs and user activity for unusual behavior indicative of exploitation attempts. Additionally, ensure that WordPress core, themes, and other plugins are kept up to date to reduce the overall attack surface. Educate site administrators and contributors about the risks of XSS and the importance of secure content practices.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-05-17T22:31:25.485Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6bdeb7ef31ef0b55b961

Added to database: 2/25/2026, 9:38:38 PM

Last enriched: 2/26/2026, 2:23:25 AM

Last updated: 2/26/2026, 9:42:42 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats