
Cloud Vulnerability DB
A community-led vulnerabilities database
The Magical Addons For Elementor WordPress plugin versions up to 1.1.41 contains a Stored Cross-Site Scripting (XSS) vulnerability. The vulnerability was discovered by SouzaZinn and publicly disclosed on July 10, 2024. This security issue affects users with contributor-level access and above, potentially impacting websites using the vulnerable plugin versions (Patchstack, WPScan).
The vulnerability stems from insufficient input sanitization and output escaping in the plugin's functionality. This security flaw has been assigned CVE-2024-38681 and received a CVSS v3.1 score of 5.4 (Medium) with the vector string CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N. The vulnerability allows authenticated users with contributor-level privileges or higher to inject arbitrary web scripts into pages (NVD).
When exploited, this vulnerability allows attackers to inject malicious web scripts that execute whenever a user accesses an affected page. This can lead to potential client-side attacks, including session hijacking, malicious redirects, or other malicious activities performed in the context of the visiting user's browser (WPScan).
The vulnerability has been patched in version 1.1.42 of the Magical Addons For Elementor plugin. Website administrators are strongly advised to update to this version or later to mitigate the security risk. No alternative workarounds have been provided (Patchstack).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."