The Royal Elementor Addons plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'status' parameter in the wpr_update_form_action_meta AJAX action in all versions up to, and including, 1.7.1056. This is due to insufficient input sanitization and output escaping, combined with a publicly leaked nonce that allows unauthenticated access to the AJAX handler. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Metrics
Affected Vendors & Products
References
History
Tue, 05 May 2026 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 05 May 2026 05:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wordpress
Wordpress wordpress Wproyal Wproyal royal Addons For Elementor – Addons And Templates Kit For Elementor |
|
| Vendors & Products |
Wordpress
Wordpress wordpress Wproyal Wproyal royal Addons For Elementor – Addons And Templates Kit For Elementor |
Tue, 05 May 2026 04:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Royal Elementor Addons plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'status' parameter in the wpr_update_form_action_meta AJAX action in all versions up to, and including, 1.7.1056. This is due to insufficient input sanitization and output escaping, combined with a publicly leaked nonce that allows unauthenticated access to the AJAX handler. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | |
| Title | Royal Addons for Elementor <= 1.7.1056 - Unauthenticated Stored Cross-Site Scripting via 'status' Parameter in wpr_update_form_action_meta | |
| Weaknesses | CWE-79 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-05-05T13:46:26.057Z
Reserved: 2026-03-25T11:13:17.868Z
Link: CVE-2026-4803
Updated: 2026-05-05T13:46:20.790Z
Status : Received
Published: 2026-05-05T04:16:18.230
Modified: 2026-05-05T04:16:18.230
Link: CVE-2026-4803
No data.
OpenCVE Enrichment
Updated: 2026-05-05T05:30:16Z