The Envo Extra plugin for WordPress is vulnerable to Stored Cross-Site Scripting via multiple parameters in versions up to, and including, 1.8.16 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
References
Configurations
History
30 Jan 2025, 16:09
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-79 | |
CPE | cpe:2.3:a:envothemes:envo_extra:*:*:*:*:*:wordpress:*:* | |
References | () https://plugins.trac.wordpress.org/browser/envo-extra/trunk/lib/elementor/widgets/button/button.php#L679 - Product | |
References | () https://plugins.trac.wordpress.org/browser/envo-extra/trunk/lib/elementor/widgets/counter/counter.php#L754 - Product | |
References | () https://plugins.trac.wordpress.org/browser/envo-extra/trunk/lib/elementor/widgets/icon-box/icon-box.php#L909 - Product | |
References | () https://plugins.trac.wordpress.org/browser/envo-extra/trunk/lib/elementor/widgets/team/team.php#L1189 - Product | |
References | () https://plugins.trac.wordpress.org/browser/envo-extra/trunk/lib/elementor/widgets/testimonial/testimonial.php#L899 - Product | |
References | () https://plugins.trac.wordpress.org/changeset/3080715/ - Patch | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/83d78ff7-bd59-431e-b579-156e23ede053?source=cve - Third Party Advisory | |
First Time |
Envothemes envo Extra
Envothemes |
21 Nov 2024, 09:42
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References | () https://plugins.trac.wordpress.org/browser/envo-extra/trunk/lib/elementor/widgets/button/button.php#L679 - | |
References | () https://plugins.trac.wordpress.org/browser/envo-extra/trunk/lib/elementor/widgets/counter/counter.php#L754 - | |
References | () https://plugins.trac.wordpress.org/browser/envo-extra/trunk/lib/elementor/widgets/icon-box/icon-box.php#L909 - | |
References | () https://plugins.trac.wordpress.org/browser/envo-extra/trunk/lib/elementor/widgets/team/team.php#L1189 - | |
References | () https://plugins.trac.wordpress.org/browser/envo-extra/trunk/lib/elementor/widgets/testimonial/testimonial.php#L899 - | |
References | () https://plugins.trac.wordpress.org/changeset/3080715/ - | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/83d78ff7-bd59-431e-b579-156e23ede053?source=cve - |
16 May 2024, 11:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-05-16 11:15
Updated : 2025-01-30 16:09
NVD link : CVE-2024-4385
Mitre link : CVE-2024-4385
CVE.ORG link : CVE-2024-4385
JSON object : View
Products Affected
envothemes
- envo_extra
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')