cleantalk
Vulnerabilities and Security Researches

Vulnerabilities and security researches forwpzoom-elementor-addons wpzoom-elementor-addons

Direction: descending
Apr 24, 2026

WPZOOM Addons for Elementor (Templates, Widgets) # CVE-2026-39597

CVE, Research URL

CVE-2026-39597

Date
-
Research Description
WPZOOM Addons for Elementor &#8211; Starter Templates &amp; Widgets [wpzoom-elementor-addons] < 1.3.5 CVE-2026-39597
Affected versions
max 1.3.5.
Status
vulnerable
Apr 15, 2026

WPZOOM Addons for Elementor (Templates, Widgets) # CVE-2026-2295

CVE, Research URL

CVE-2026-2295

Date
Feb 11, 2026
Research Description
The WPZOOM Addons for Elementor – Starter Templates & Widgets plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'ajax_post_grid_load_more' function in all versions up to, and including, 1.3.2. This makes it possible for unauthenticated attackers to retrieve protected (draft, future, pending) post titles and excerpts that should not be accessible to unauthenticated users.
Affected versions
max 1.3.3.
Status
vulnerable
Jan 11, 2026

WPZOOM Addons for Elementor (Templates, Widgets) # CVE-2025-67951

CVE, Research URL

CVE-2025-67951

Date
Dec 16, 2025
Research Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WPZOOM WPZOOM Addons for Elementor wpzoom-elementor-addons allows DOM-Based XSS.This issue affects WPZOOM Addons for Elementor: from n/a through <= 1.2.10.
Affected versions
max 1.2.10.
Status
vulnerable
Jun 21, 2024

WPZOOM Addons for Elementor (Templates, Widgets) # CVE-2024-5686

CVE, Research URL

CVE-2024-5686

Date
Jun 20, 2024
Research Description
The WPZOOM Addons for Elementor (Templates, Widgets) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘url’ attribute within the plugin's Team Members widget in all versions up to, and including, 1.1.38 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Affected versions
max 1.1.39.
Status
vulnerable
Jun 07, 2024

WPZOOM Addons for Elementor (Templates, Widgets) # CVE-2024-5147

CVE, Research URL

CVE-2024-5147

Date
May 22, 2024
Research Description
The WPZOOM Addons for Elementor (Templates, Widgets) plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 1.1.37 via the 'grid_style' parameter. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included.
Affected versions
max 1.1.38.
Status
vulnerable

WPZOOM Addons for Elementor (Templates, Widgets) # CVE-2024-33539

CVE, Research URL

CVE-2024-33539

Date
Apr 29, 2024
Research Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WPZOOM WPZOOM Addons for Elementor (Templates, Widgets) allows Stored XSS.This issue affects WPZOOM Addons for Elementor (Templates, Widgets): from n/a through 1.1.35.
Affected versions
max 1.1.36.
Status
vulnerable

WPZOOM Addons for Elementor (Templates, Widgets) # CVE-2024-4370

CVE, Research URL

CVE-2024-4370

Date
May 15, 2024
Research Description
The WPZOOM Addons for Elementor (Templates, Widgets) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's widget Image Box in all versions up to, and including, 1.1.36 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Affected versions
max 1.1.37.
Status
vulnerable