Skip to content
CVSS 7.2 · HIGH

CVE-2026-4803

The Royal Elementor Addons plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'status' parameter in the wpr_update_form_action_meta AJAX action in all versions up to, and including, 1.7.1056. This is due to insufficient input sanitization and output escaping, combined with a publicly leaked nonce that allows unauthenticated access to the AJAX handler. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

Ver en NVD

Análisis

The Royal Elementor Addons plugin for WordPress is vulnerable to unauthenticated Stored Cross-Site Scripting. An attacker can use a leaked nonce to inject malicious scripts into your site, potentially compromising users or administrative accounts. If you use this plugin, update to a version beyond 1.7.1056 immediately.

Severidad

Puntaje: 7.2(HIGH)
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
AV: NETWORK
AC: LOW
PR: NONE
UI: NONE
S: CHANGED
C: LOW
I: LOW
A: NONE
Tipo de falla (CWE): CWE-79

EPSS

Probabilidad de explotación (próx. 30 días): 0.0010 (0.1%)
Percentil: 27.9%
EPSS: 2026-05-06

Descripción técnica

The Royal Elementor Addons plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'status' parameter in the wpr_update_form_action_meta AJAX action in all versions up to, and including, 1.7.1056. This is due to insufficient input sanitization and output escaping, combined with a publicly leaked nonce that allows unauthenticated access to the AJAX handler. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

Publicada: 5/5/2026, 4:16:18
Última modificación: 5/5/2026, 19:08:20

Referencias

InicioEventosBlogRecursosEquipo