CVE-2024-51585: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in nicheaddons Sales Page Addon – Elementor & Beaver Builder
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in nicheaddons Sales Page Addon – Elementor & Beaver Builder sales-page-addon allows Stored XSS.This issue affects Sales Page Addon – Elementor & Beaver Builder: from n/a through <= 1.4.5.
AI Analysis
Technical Summary
CVE-2024-51585 is a vulnerability classified as Stored Cross-Site Scripting (XSS) found in the Sales Page Addon for Elementor & Beaver Builder developed by nicheaddons. This addon is used to create sales pages within WordPress sites that utilize the Elementor or Beaver Builder page builders. The vulnerability stems from improper neutralization of user-supplied input during the generation of web pages, which allows malicious actors to inject and store arbitrary JavaScript code within the affected pages. When other users or administrators visit these compromised pages, the injected scripts execute in their browsers under the context of the vulnerable site. This can lead to a range of malicious outcomes including theft of session cookies, redirection to malicious sites, unauthorized actions performed on behalf of the user, or defacement. The affected versions include all versions up to and including 1.4.5, with no fixed version indicated yet. The vulnerability was publicly disclosed on November 9, 2024, but no known active exploits have been reported. The absence of a CVSS score requires an independent severity assessment. Stored XSS vulnerabilities are particularly dangerous because the malicious payload persists on the server and affects all users who access the infected page. The vulnerability impacts the confidentiality and integrity of user data and can disrupt normal operations if exploited. The attack requires no authentication but does require user interaction in the form of visiting the compromised page. Given the widespread use of WordPress and these popular page builders, the scope of affected systems is significant, especially for e-commerce and marketing sites that rely on sales page addons.
Potential Impact
The impact of CVE-2024-51585 is significant for organizations using the Sales Page Addon with Elementor or Beaver Builder. Successful exploitation can lead to the execution of arbitrary JavaScript in the browsers of site visitors and administrators, potentially resulting in session hijacking, theft of sensitive information such as credentials or personal data, unauthorized actions performed with elevated privileges, and reputational damage due to defacement or malicious redirects. For e-commerce sites, this could translate into financial losses and customer trust erosion. Additionally, attackers could use the vulnerability as a foothold to deploy further attacks such as malware distribution or phishing campaigns. The persistent nature of stored XSS increases the risk as the malicious code remains active until removed. Organizations with high traffic or sensitive user data are at greater risk, and the vulnerability could be leveraged in targeted attacks against high-value targets. The lack of a patch at the time of disclosure increases exposure, making timely mitigation critical.
Mitigation Recommendations
To mitigate CVE-2024-51585, organizations should first check for updates or patches from nicheaddons and apply them immediately once available. In the absence of an official patch, administrators should implement strict input validation and output encoding on all user-supplied data within the Sales Page Addon context to prevent script injection. Employing a Web Application Firewall (WAF) with rules to detect and block XSS payloads can provide a temporary protective layer. Site owners should audit existing sales pages for suspicious or unexpected scripts and remove any malicious content. Restricting user permissions to limit who can create or edit sales pages reduces the attack surface. Additionally, enabling Content Security Policy (CSP) headers can help mitigate the impact of injected scripts by restricting the sources from which scripts can be executed. Regular security scanning and monitoring for anomalous behavior are recommended to detect exploitation attempts early. Finally, educating content editors and administrators about the risks of XSS and safe content practices can help prevent accidental introduction of malicious code.
Affected Countries
United States, United Kingdom, Germany, Canada, Australia, India, France, Brazil, Netherlands, Japan, Italy, Spain
CVE-2024-51585: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in nicheaddons Sales Page Addon – Elementor & Beaver Builder
Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in nicheaddons Sales Page Addon – Elementor & Beaver Builder sales-page-addon allows Stored XSS.This issue affects Sales Page Addon – Elementor & Beaver Builder: from n/a through <= 1.4.5.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-51585 is a vulnerability classified as Stored Cross-Site Scripting (XSS) found in the Sales Page Addon for Elementor & Beaver Builder developed by nicheaddons. This addon is used to create sales pages within WordPress sites that utilize the Elementor or Beaver Builder page builders. The vulnerability stems from improper neutralization of user-supplied input during the generation of web pages, which allows malicious actors to inject and store arbitrary JavaScript code within the affected pages. When other users or administrators visit these compromised pages, the injected scripts execute in their browsers under the context of the vulnerable site. This can lead to a range of malicious outcomes including theft of session cookies, redirection to malicious sites, unauthorized actions performed on behalf of the user, or defacement. The affected versions include all versions up to and including 1.4.5, with no fixed version indicated yet. The vulnerability was publicly disclosed on November 9, 2024, but no known active exploits have been reported. The absence of a CVSS score requires an independent severity assessment. Stored XSS vulnerabilities are particularly dangerous because the malicious payload persists on the server and affects all users who access the infected page. The vulnerability impacts the confidentiality and integrity of user data and can disrupt normal operations if exploited. The attack requires no authentication but does require user interaction in the form of visiting the compromised page. Given the widespread use of WordPress and these popular page builders, the scope of affected systems is significant, especially for e-commerce and marketing sites that rely on sales page addons.
Potential Impact
The impact of CVE-2024-51585 is significant for organizations using the Sales Page Addon with Elementor or Beaver Builder. Successful exploitation can lead to the execution of arbitrary JavaScript in the browsers of site visitors and administrators, potentially resulting in session hijacking, theft of sensitive information such as credentials or personal data, unauthorized actions performed with elevated privileges, and reputational damage due to defacement or malicious redirects. For e-commerce sites, this could translate into financial losses and customer trust erosion. Additionally, attackers could use the vulnerability as a foothold to deploy further attacks such as malware distribution or phishing campaigns. The persistent nature of stored XSS increases the risk as the malicious code remains active until removed. Organizations with high traffic or sensitive user data are at greater risk, and the vulnerability could be leveraged in targeted attacks against high-value targets. The lack of a patch at the time of disclosure increases exposure, making timely mitigation critical.
Mitigation Recommendations
To mitigate CVE-2024-51585, organizations should first check for updates or patches from nicheaddons and apply them immediately once available. In the absence of an official patch, administrators should implement strict input validation and output encoding on all user-supplied data within the Sales Page Addon context to prevent script injection. Employing a Web Application Firewall (WAF) with rules to detect and block XSS payloads can provide a temporary protective layer. Site owners should audit existing sales pages for suspicious or unexpected scripts and remove any malicious content. Restricting user permissions to limit who can create or edit sales pages reduces the attack surface. Additionally, enabling Content Security Policy (CSP) headers can help mitigate the impact of injected scripts by restricting the sources from which scripts can be executed. Regular security scanning and monitoring for anomalous behavior are recommended to detect exploitation attempts early. Finally, educating content editors and administrators about the risks of XSS and safe content practices can help prevent accidental introduction of malicious code.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Patchstack
- Date Reserved
- 2024-10-30T15:04:10.017Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 69cd7508e6bfc5ba1df0252b
Added to database: 4/1/2026, 7:42:00 PM
Last enriched: 4/2/2026, 10:42:18 AM
Last updated: 4/6/2026, 9:16:25 AM
Views: 2
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.