CVE-2026-4803
Royal Elementor Addons · Royal Elementor Addons
The Royal Elementor Addons plugin for WordPress is vulnerable to Stored Cross-Site Scripting (XSS) via the 'status' parameter.
Executive summary
A Stored XSS vulnerability in the Royal Elementor Addons plugin allows for potential script injection, necessitating an immediate plugin update.
Vulnerability
The plugin is vulnerable to Stored Cross-Site Scripting (XSS) via the 'status' parameter in the wpr_update_form_action_meta AJAX action. This allows an authenticated attacker with sufficient privileges to inject malicious scripts that execute in the browser of other users, including administrators.
Business impact
With a CVSS score of 7.2, this XSS vulnerability is a serious threat. It could lead to session hijacking, defacement of the website, or unauthorized administrative actions, severely impacting the site's security and trustworthiness.
Remediation
Immediate Action: Update the Royal Elementor Addons plugin to the latest version immediately to patch the XSS vulnerability.
Proactive Monitoring: Monitor for suspicious script injections or unauthorized modifications to form settings within the WordPress dashboard.
Compensating Controls: Utilize a Web Application Firewall (WAF) with XSS protection rules to filter malicious payloads from being submitted to the vulnerable AJAX action.
Exploitation status
Public Exploit Available: false
Analyst recommendation
XSS vulnerabilities in popular plugins are frequently targeted. Administrators must apply updates promptly and strictly manage administrative access to minimize the risk of malicious script injection.