Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-51585: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in nicheaddons Sales Page Addon – Elementor & Beaver Builder

0
Unknown
VulnerabilityCVE-2024-51585cvecve-2024-51585
Published: Sat Nov 09 2024 (11/09/2024, 14:59:25 UTC)
Source: CVE Database V5
Vendor/Project: nicheaddons
Product: Sales Page Addon – Elementor & Beaver Builder

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in nicheaddons Sales Page Addon – Elementor & Beaver Builder sales-page-addon allows Stored XSS.This issue affects Sales Page Addon – Elementor & Beaver Builder: from n/a through <= 1.4.5.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/02/2026, 10:42:18 UTC

Technical Analysis

CVE-2024-51585 is a vulnerability classified as Stored Cross-Site Scripting (XSS) found in the Sales Page Addon for Elementor & Beaver Builder developed by nicheaddons. This addon is used to create sales pages within WordPress sites that utilize the Elementor or Beaver Builder page builders. The vulnerability stems from improper neutralization of user-supplied input during the generation of web pages, which allows malicious actors to inject and store arbitrary JavaScript code within the affected pages. When other users or administrators visit these compromised pages, the injected scripts execute in their browsers under the context of the vulnerable site. This can lead to a range of malicious outcomes including theft of session cookies, redirection to malicious sites, unauthorized actions performed on behalf of the user, or defacement. The affected versions include all versions up to and including 1.4.5, with no fixed version indicated yet. The vulnerability was publicly disclosed on November 9, 2024, but no known active exploits have been reported. The absence of a CVSS score requires an independent severity assessment. Stored XSS vulnerabilities are particularly dangerous because the malicious payload persists on the server and affects all users who access the infected page. The vulnerability impacts the confidentiality and integrity of user data and can disrupt normal operations if exploited. The attack requires no authentication but does require user interaction in the form of visiting the compromised page. Given the widespread use of WordPress and these popular page builders, the scope of affected systems is significant, especially for e-commerce and marketing sites that rely on sales page addons.

Potential Impact

The impact of CVE-2024-51585 is significant for organizations using the Sales Page Addon with Elementor or Beaver Builder. Successful exploitation can lead to the execution of arbitrary JavaScript in the browsers of site visitors and administrators, potentially resulting in session hijacking, theft of sensitive information such as credentials or personal data, unauthorized actions performed with elevated privileges, and reputational damage due to defacement or malicious redirects. For e-commerce sites, this could translate into financial losses and customer trust erosion. Additionally, attackers could use the vulnerability as a foothold to deploy further attacks such as malware distribution or phishing campaigns. The persistent nature of stored XSS increases the risk as the malicious code remains active until removed. Organizations with high traffic or sensitive user data are at greater risk, and the vulnerability could be leveraged in targeted attacks against high-value targets. The lack of a patch at the time of disclosure increases exposure, making timely mitigation critical.

Mitigation Recommendations

To mitigate CVE-2024-51585, organizations should first check for updates or patches from nicheaddons and apply them immediately once available. In the absence of an official patch, administrators should implement strict input validation and output encoding on all user-supplied data within the Sales Page Addon context to prevent script injection. Employing a Web Application Firewall (WAF) with rules to detect and block XSS payloads can provide a temporary protective layer. Site owners should audit existing sales pages for suspicious or unexpected scripts and remove any malicious content. Restricting user permissions to limit who can create or edit sales pages reduces the attack surface. Additionally, enabling Content Security Policy (CSP) headers can help mitigate the impact of injected scripts by restricting the sources from which scripts can be executed. Regular security scanning and monitoring for anomalous behavior are recommended to detect exploitation attempts early. Finally, educating content editors and administrators about the risks of XSS and safe content practices can help prevent accidental introduction of malicious code.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2024-10-30T15:04:10.017Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69cd7508e6bfc5ba1df0252b

Added to database: 4/1/2026, 7:42:00 PM

Last enriched: 4/2/2026, 10:42:18 AM

Last updated: 4/6/2026, 9:16:25 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses