MEDIUM (6.3)
    Plugin

    Stored Cross-Site Scripting Vulnerability in Royal Addons for Elementor

    Published Date: 4/4/2026
    CVE ID: CVE-2026-0664

    Summary

    The Royal Addons for Elementor plugin up to version 1.7.1049 is susceptible to a Stored Cross-Site Scripting (XSS) vulnerability. Authenticated users with contributor-level access or higher can exploit this issue by injecting arbitrary scripts via the 'button_text' parameter.

    Vulnerability Details

    Stored Cross-Site Scripting (XSS) is a type of security flaw that allows attackers to inject malicious scripts into webpages viewed by other users. In this case, the vulnerability exists in the Royal Addons for Elementor plugin due to insufficient input sanitization and output escaping for the 'button_text' parameter. This flaw permits authenticated users with sufficient privileges to insert malicious scripts that execute when the manipulated page is accessed by any user. The issue poses a serious threat as it can lead to data theft, session hijacking, or unauthorized actions on behalf of otherwise unsuspecting users. The risk is compounded in cases where site contributors have upload permissions, increasing the avenues through which malicious actors can attack the site.

    Recommendations

    To mitigate this vulnerability, ensure proper sanitization and escaping of all user inputs and outputs, especially those involving dynamic content. Limit the capabilities of users with contributor-level access to the bare minimum required to perform their duties, and regularly audit site plugins for unusual activity. Additionally, site administrators should install a reliable security plugin to monitor and block suspicious activity.

    Available Fixes

    Last Updated: 4/7/2026
    Jedar

    Jedar for Digital Rights is a non-profit organization dedicated to protecting digital freedoms, enhancing online privacy, and promoting secure digital practices for vulnerable communities worldwide.

    Follow Us

    All Rights Reserved © 2026 Jedar for Digital Rights.

    Cookie Preferences

    We use cookies to enhance your browsing experience, serve personalized ads or content, and analyze our traffic. By clicking "Accept All", you consent to our use of cookies.

    Learn More