cve/2021/CVE-2021-24203.md
2025-09-29 21:09:30 +02:00

18 lines
1.1 KiB
Markdown
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

### [CVE-2021-24203](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24203)
![](https://img.shields.io/static/v1?label=Product&message=Elementor%20Website%20Builder&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=3.1.4%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-site%20Scripting%20(XSS)&color=brightgreen)
### Description
In the Elementor Website Builder WordPress plugin before 3.1.4, the divider widget (includes/widgets/divider.php) accepts an html_tag parameter. Although the element control lists a fixed set of possible html tags, it is possible for a user with Contributor or above permissions to send a modified save_builder request with this parameter set to script and combined with a text parameter containing JavaScript, which will then be executed when the saved page is viewed or previewed.
### POC
#### Reference
- https://wpscan.com/vulnerability/aa152ad0-5b3d-4d1f-88f4-6899a546e72e
#### Github
- https://github.com/20142995/nuclei-templates