CVE-2024-6495: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in leap13 Premium Addons for Elementor
CVE-2024-6495 is a stored cross-site scripting (XSS) vulnerability in the Premium Addons for Elementor WordPress plugin, specifically in the Animated Text widget. It affects all versions up to 4. 10. 36 and allows authenticated users with contributor-level access or higher to inject malicious scripts that execute when other users view the compromised page. The vulnerability arises from insufficient input sanitization and output escaping of user-supplied attributes. Exploitation does not require user interaction but does require authentication with contributor or higher privileges. The CVSS score is 6. 4 (medium severity), reflecting the limited scope of impact and the need for some privileges to exploit. No known exploits are currently reported in the wild. Organizations using this plugin should prioritize updating or applying mitigations to prevent potential script injection attacks that could lead to session hijacking, defacement, or unauthorized actions within the WordPress site.
AI Analysis
Technical Summary
CVE-2024-6495 is a stored cross-site scripting vulnerability identified in the Premium Addons for Elementor plugin for WordPress, affecting all versions up to and including 4.10.36. The flaw exists in the Animated Text widget due to improper neutralization of input during web page generation, specifically insufficient sanitization and escaping of user-supplied attributes. Authenticated attackers with contributor-level access or higher can exploit this vulnerability by injecting arbitrary JavaScript code into pages. When other users visit these compromised pages, the injected scripts execute in their browsers, potentially leading to session hijacking, privilege escalation, or other malicious activities. The vulnerability requires authentication but no additional user interaction, increasing its risk within environments where multiple users have editing privileges. The CVSS 3.1 base score of 6.4 reflects a medium severity, considering the network attack vector, low attack complexity, and partial impact on confidentiality and integrity but no impact on availability. No patches or exploits are currently publicly available, but the vulnerability is published and should be addressed promptly to avoid exploitation. This vulnerability falls under CWE-79, a common and well-understood category of web application security issues.
Potential Impact
The primary impact of CVE-2024-6495 is the potential for attackers with contributor-level access to inject persistent malicious scripts into WordPress pages, which execute in the context of other users’ browsers. This can lead to session hijacking, theft of authentication tokens, unauthorized actions performed on behalf of users, defacement, or distribution of malware. For organizations, this undermines the integrity and confidentiality of their web presence and user data. Since the vulnerability requires authenticated access, the risk is higher in environments with multiple content editors or contributors, such as media companies, educational institutions, and large enterprises using WordPress for content management. The scope of impact includes any site using the vulnerable plugin version, potentially affecting thousands of websites worldwide. While availability is not impacted, the breach of trust and potential data leakage can cause reputational damage and compliance issues. The absence of known exploits in the wild currently limits immediate risk, but the vulnerability’s public disclosure increases the likelihood of future exploitation attempts.
Mitigation Recommendations
Organizations should immediately verify if they use the Premium Addons for Elementor plugin and identify the version in use. Since no official patch is currently available, administrators should consider the following mitigations: restrict contributor-level access to trusted users only; implement strict user role management and auditing to minimize the number of users with editing privileges; apply web application firewall (WAF) rules to detect and block suspicious script injection attempts targeting the Animated Text widget; disable or remove the Animated Text widget if not essential; monitor logs and user activity for signs of exploitation; and prepare to apply official patches or updates from the vendor once released. Additionally, site owners should ensure that WordPress core and all plugins are kept up to date and consider employing Content Security Policy (CSP) headers to limit the impact of injected scripts. Regular security training for content editors can also reduce the risk of inadvertent exploitation.
Affected Countries
United States, India, United Kingdom, Germany, Canada, Australia, France, Brazil, Japan, Netherlands
CVE-2024-6495: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in leap13 Premium Addons for Elementor
Description
CVE-2024-6495 is a stored cross-site scripting (XSS) vulnerability in the Premium Addons for Elementor WordPress plugin, specifically in the Animated Text widget. It affects all versions up to 4. 10. 36 and allows authenticated users with contributor-level access or higher to inject malicious scripts that execute when other users view the compromised page. The vulnerability arises from insufficient input sanitization and output escaping of user-supplied attributes. Exploitation does not require user interaction but does require authentication with contributor or higher privileges. The CVSS score is 6. 4 (medium severity), reflecting the limited scope of impact and the need for some privileges to exploit. No known exploits are currently reported in the wild. Organizations using this plugin should prioritize updating or applying mitigations to prevent potential script injection attacks that could lead to session hijacking, defacement, or unauthorized actions within the WordPress site.
AI-Powered Analysis
Technical Analysis
CVE-2024-6495 is a stored cross-site scripting vulnerability identified in the Premium Addons for Elementor plugin for WordPress, affecting all versions up to and including 4.10.36. The flaw exists in the Animated Text widget due to improper neutralization of input during web page generation, specifically insufficient sanitization and escaping of user-supplied attributes. Authenticated attackers with contributor-level access or higher can exploit this vulnerability by injecting arbitrary JavaScript code into pages. When other users visit these compromised pages, the injected scripts execute in their browsers, potentially leading to session hijacking, privilege escalation, or other malicious activities. The vulnerability requires authentication but no additional user interaction, increasing its risk within environments where multiple users have editing privileges. The CVSS 3.1 base score of 6.4 reflects a medium severity, considering the network attack vector, low attack complexity, and partial impact on confidentiality and integrity but no impact on availability. No patches or exploits are currently publicly available, but the vulnerability is published and should be addressed promptly to avoid exploitation. This vulnerability falls under CWE-79, a common and well-understood category of web application security issues.
Potential Impact
The primary impact of CVE-2024-6495 is the potential for attackers with contributor-level access to inject persistent malicious scripts into WordPress pages, which execute in the context of other users’ browsers. This can lead to session hijacking, theft of authentication tokens, unauthorized actions performed on behalf of users, defacement, or distribution of malware. For organizations, this undermines the integrity and confidentiality of their web presence and user data. Since the vulnerability requires authenticated access, the risk is higher in environments with multiple content editors or contributors, such as media companies, educational institutions, and large enterprises using WordPress for content management. The scope of impact includes any site using the vulnerable plugin version, potentially affecting thousands of websites worldwide. While availability is not impacted, the breach of trust and potential data leakage can cause reputational damage and compliance issues. The absence of known exploits in the wild currently limits immediate risk, but the vulnerability’s public disclosure increases the likelihood of future exploitation attempts.
Mitigation Recommendations
Organizations should immediately verify if they use the Premium Addons for Elementor plugin and identify the version in use. Since no official patch is currently available, administrators should consider the following mitigations: restrict contributor-level access to trusted users only; implement strict user role management and auditing to minimize the number of users with editing privileges; apply web application firewall (WAF) rules to detect and block suspicious script injection attempts targeting the Animated Text widget; disable or remove the Animated Text widget if not essential; monitor logs and user activity for signs of exploitation; and prepare to apply official patches or updates from the vendor once released. Additionally, site owners should ensure that WordPress core and all plugins are kept up to date and consider employing Content Security Policy (CSP) headers to limit the impact of injected scripts. Regular security training for content editors can also reduce the risk of inadvertent exploitation.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2024-07-03T19:43:50.564Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6c04b7ef31ef0b55f00b
Added to database: 2/25/2026, 9:39:16 PM
Last enriched: 2/26/2026, 3:12:31 AM
Last updated: 2/26/2026, 9:42:01 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-28138: Deserialization of Untrusted Data in Stylemix uListing
HighCVE-2026-28136: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in VeronaLabs WP SMS
HighCVE-2026-28132: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in villatheme WooCommerce Photo Reviews
HighCVE-2026-28131: Insertion of Sensitive Information Into Sent Data in WPVibes Elementor Addon Elements
HighCVE-2026-28083: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in UX-themes Flatsome
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.