CVE-2024-1235
The Elementor Addons by Livemesh plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the custom class field in all versions up to, and including, 8.3.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor access or higher, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Attack Parameters
Technical Impact
Affected Configurations
Total: 101 detected entries
Time Line
Key Metrics
Recommended Solution
Related News Articles
6 article(s) mentioning this vulnerability
Veeam Vulnerabilities Expose Backup Servers to RCE Attacks
Veeam has released security updates to patch multiple critical vulnerabilities in its Backup & Replication software, including a RCE flaw.
Multiple Vulnerabilities Identified in Elastic Products
CERT-FR has identified multiple critical vulnerabilities in Elastic products. These include denial of service, data confidentiality breaches, and remote code…
Weekly Cybersecurity Update: MongoDB Attacks, Wallet Breaches, Android Spyware, and More
Weekly recap of major cybersecurity incidents in 2025, including MongoDB attacks, wallet breaches, Android spyware, and insider crime.
Mise à jour hebdomadaire de la sécurité numérique : Attaques MongoDB, Fraude sur les porte-monnaies, Logiciels malveillants Android et Plus
Récapitulatif hebdomadaire des principales incidents de sécurité numériques en 2025, y compris les attaques MongoDB, les fraude sur les porte-monnaies,…
Plusieurs Vulnérabilités Identifiées dans les Produits Elastic
CERT-FR a identifié plusieurs vulnérabilités critiques dans les produits Elastic. Ces vulnérabilités comprennent des refus de service, des violations de…
Foxit Security Advisory: Multiple Vulnerabilities Identified
Multiple security vulnerabilities in Foxit products, including code execution, privilege escalation, and denial of service issues.
Immediate Action Plan
1. Inventory
Identify all affected systems in your infrastructure.
2. Assessment
Assess exposure and criticality for your organization.
3. Mitigation
Apply patches or available workarounds.
4. Verification
Test and confirm effectiveness of applied measures.
