Vulnerabilities and security researches forpowerpack-lite-for-elementor powerpack-lite-for-elementor
Direction: descendingPowerPack Addons for Elementor (Free Widgets, Extensions and Templates) # CVE-2025-1512
- CVE, Research URL
- Home page URL
-
Security reports for PowerPack Addons for Elementor (Free Widgets, Extensions and Templates)
- Date
- Apr 01, 2025
- Research Description
- The PowerPack Elementor Addons (Free Widgets, Extensions and Templates) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Custom Cursor Extension in all versions up to, and including, 2.9.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
PowerPack Addons for Elementor (Free Widgets, Extensions and Templates) # CVE-2024-10692
- CVE, Research URL
- Home page URL
-
Security reports for PowerPack Addons for Elementor (Free Widgets, Extensions and Templates)
- Date
- Dec 06, 2024
- Research Description
- The PowerPack Elementor Addons (Free Widgets, Extensions and Templates) plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 2.8.1 via the Content Reveal widget due to insufficient restrictions on which posts can be included. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract data from password protected, private, or draft posts that they should not have access to.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
PowerPack Addons for Elementor (Free Widgets, Extensions and Templates) # CVE-2024-5787
- CVE, Research URL
- Home page URL
-
Security reports for PowerPack Addons for Elementor (Free Widgets, Extensions and Templates)
- Date
- Jun 13, 2024
- Research Description
- The PowerPack Addons for Elementor (Free Widgets, Extensions and Templates) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'url' attribute within the plugin's Link Effects widget in all versions up to, and including, 2.7.20 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
PowerPack Addons for Elementor (Free Widgets, Extensions and Templates) # CVE-2024-5327
- CVE, Research URL
- Home page URL
-
Security reports for PowerPack Addons for Elementor (Free Widgets, Extensions and Templates)
- Date
- May 30, 2024
- Research Description
- The PowerPack Addons for Elementor (Free Widgets, Extensions and Templates) plugin for WordPress is vulnerable to DOM-Based Stored Cross-Site Scripting via the ‘pp_animated_gradient_bg_color’ parameter in all versions up to, and including, 2.7.19 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
PowerPack Addons for Elementor (Free Widgets, Extensions and Templates) # CVE-2021-25027
- CVE, Research URL
- Home page URL
-
Security reports for PowerPack Addons for Elementor (Free Widgets, Extensions and Templates)
- Date
- Jan 03, 2022
- Research Description
- The PowerPack Addons for Elementor WordPress plugin before 2.6.2 does not escape the tab parameter before outputting it back in an attribute in the admin dashboard, leading to a Reflected Cross-Site Scripting issue
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
PowerPack Addons for Elementor (Free Widgets, Extensions and Templates) # CVE-2021-24263
- CVE, Research URL
- Home page URL
-
Security reports for PowerPack Addons for Elementor (Free Widgets, Extensions and Templates)
- Date
- May 06, 2021
- Research Description
- The “Elementor Addons – PowerPack Addons for Elementor” WordPress Plugin before 2.3.2 for WordPress has several widgets that are vulnerable to stored Cross-Site Scripting (XSS) by lower-privileged users such as contributors, all via a similar method.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
PowerPack Addons for Elementor (Free Widgets, Extensions and Templates) # CVE-2023-6984
- CVE, Research URL
- Home page URL
-
Security reports for PowerPack Addons for Elementor (Free Widgets, Extensions and Templates)
- Date
- Jan 03, 2024
- Research Description
- The PowerPack Addons for Elementor (Free Widgets, Extensions and Templates) plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.7.13. This is due to missing or incorrect nonce validation in the powerpack-lite-for-elementor/classes/class-pp-admin-settings.php file. This makes it possible for unauthenticated attackers to modify and reset plugin settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
PowerPack Addons for Elementor (Free Widgets, Extensions and Templates) # CVE-2024-1055
- CVE, Research URL
- Home page URL
-
Security reports for PowerPack Addons for Elementor (Free Widgets, Extensions and Templates)
- Date
- Feb 07, 2024
- Research Description
- The PowerPack Addons for Elementor (Free Widgets, Extensions and Templates) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's buttons in all versions up to, and including, 2.7.14 due to insufficient input sanitization and output escaping on user supplied URL values. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
PowerPack Addons for Elementor (Free Widgets, Extensions and Templates) # CVE-2024-1411
- CVE, Research URL
- Home page URL
-
Security reports for PowerPack Addons for Elementor (Free Widgets, Extensions and Templates)
- Date
- Feb 29, 2024
- Research Description
- The PowerPack Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the settings of the Twitter Buttons Widget in all versions up to, and including, 2.7.15 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
PowerPack Addons for Elementor (Free Widgets, Extensions and Templates) # CVE-2024-2491
- CVE, Research URL
- Home page URL
-
Security reports for PowerPack Addons for Elementor (Free Widgets, Extensions and Templates)
- Date
- Mar 30, 2024
- Research Description
- The PowerPack Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the *_html_tag* attribute of multiple widgets in all versions up to, and including, 2.7.17 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
PowerPack Addons for Elementor (Free Widgets, Extensions and Templates) # CVE-2024-2492
- CVE, Research URL
- Home page URL
-
Security reports for PowerPack Addons for Elementor (Free Widgets, Extensions and Templates)
- Date
- Apr 10, 2024
- Research Description
- The PowerPack Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Twitter Tweet widget in all versions up to, and including, 2.7.18 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable