Skip to content
CVSS 7.2 · HIGH

CVE-2026-4803

The Royal Elementor Addons plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'status' parameter in the wpr_update_form_action_meta AJAX action in all versions up to, and including, 1.7.1056. This is due to insufficient input sanitization and output escaping, combined with a publicly leaked nonce that allows unauthenticated access to the AJAX handler. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

View on NVD

Analysis

The Royal Elementor Addons plugin for WordPress is vulnerable to unauthenticated Stored Cross-Site Scripting. An attacker can use a leaked nonce to inject malicious scripts into your site, potentially compromising users or administrative accounts. If you use this plugin, update to a version beyond 1.7.1056 immediately.

Severity

Score: 7.2(HIGH)
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
AV: NETWORK
AC: LOW
PR: NONE
UI: NONE
S: CHANGED
C: LOW
I: LOW
A: NONE
Weakness (CWE): CWE-79

EPSS

Probability of exploitation (next 30 days): 0.0010 (0.1%)
Percentile: 27.9%
EPSS: 2026-05-06

Technical description

The Royal Elementor Addons plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'status' parameter in the wpr_update_form_action_meta AJAX action in all versions up to, and including, 1.7.1056. This is due to insufficient input sanitization and output escaping, combined with a publicly leaked nonce that allows unauthenticated access to the AJAX handler. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

Published: 5/5/2026, 4:16:18 AM
Last modified: 5/5/2026, 7:08:20 PM

References

HomeEventsBlogResourcesTeam