Elementor Addons by Livemesh Vulnerability – Authenticated (Contributor+) Stored Cross-Site Scripting – CVE-2024-0448 |WordPress Plugin Vulnerability Report

Plugin Name: Elementor Addons by Livemesh

Key Information:

  • Software Type: Plugin
  • Software Slug: addons-for-elementor
  • Software Status: Active
  • Software Author: livemesh
  • Software Downloads: 3,692,182
  • Active Installs: 70,000
  • Last Updated: January 30, 2024
  • Patched Versions: 8.3.2
  • Affected Versions: <= 8.3.1

Vulnerability Details:

  • Name: Elementor Addons by Livemesh <= 8.3.1
  • Title: Authenticated (Contributor+) Stored Cross-Site Scripting
  • Type: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
  • CVE: CVE-2024-0448
  • CVSS Score: 6.4
  • Publicly Published: January 25, 2024
  • Researcher: Webbernaut
  • Description: The Elementor Addons by Livemesh plugin for WordPress is vulnerable to Stored Cross-Site Scripting (XSS) through the plugin's widget URL parameters in all versions up to and including 8.3.1. This vulnerability arises from insufficient input sanitization and output escaping, enabling authenticated attackers with contributor-level access or higher to inject arbitrary web scripts into pages. These scripts can execute whenever a user accesses an injected page, posing a significant security risk.


The Elementor Addons by Livemesh plugin for WordPress harbors a vulnerability in versions up to and including 8.3.1, which allows authenticated contributors or higher to perform Stored Cross-Site Scripting via the plugin's widget URL parameters. This vulnerability has been addressed and patched in version 8.3.2.

Detailed Overview:

Identified by the researcher known as Webbernaut, this vulnerability exposes websites to potential security breaches by allowing contributors with malicious intent to inject executable scripts into web pages. The injected content can lead to unauthorized actions being performed on behalf of the users visiting the compromised pages, including data theft, session hijacking, and the spread of malware. The Elementor Addons plugin, widely used for enhancing Elementor with additional widgets and features, becomes a critical point of concern due to its widespread adoption and the level of access required to exploit this vulnerability.

Advice for Users:

  • Immediate Action: Users of the Elementor Addons by Livemesh plugin should immediately update to the latest version, 8.3.2, which contains the necessary patches to mitigate this vulnerability.
  • Check for Signs of Vulnerability: Website administrators are advised to review their sites for any unusual or unauthorized changes to widget URL parameters or other signs of compromise.
  • Alternate Plugins: While the patched version is secure, users may consider exploring alternative plugins that offer similar functionalities as a precautionary measure against future vulnerabilities.
  • Stay Updated: It is crucial for website owners and administrators to regularly update all WordPress plugins, themes, and the core system to protect against known vulnerabilities.


The swift response by Livemesh to patch the vulnerability in the Elementor Addons plugin highlights the critical importance of maintaining up-to-date software on your WordPress site. By updating to version 8.3.2 or later, users can safeguard their websites against this specific security threat. Keeping software updated, along with regular security audits, can significantly reduce the risk posed by potential vulnerabilities.


In the fast-evolving digital landscape, the security of a WordPress website can never be overstated, especially when popular plugins become the target of vulnerabilities. The recent identification of a critical security flaw in the Elementor Addons by Livemesh plugin, marked as CVE-2024-0448, serves as a stark reminder of the constant vigilance required to protect online assets. This vulnerability, which allows for Stored Cross-Site Scripting (XSS) through insufficient input sanitization, underscores the need for website owners to regularly update and monitor their digital platforms.

Elementor Addons by Livemesh: A Popular Plugin at Risk

Elementor Addons by Livemesh enhances WordPress sites with additional widgets and features, boasting over 70,000 active installs and nearly 3.7 million downloads. Its functionality and popularity make it an integral component of many websites, but this also means that vulnerabilities within the plugin can have widespread implications.

Understanding the Vulnerability: CVE-2024-0448

CVE-2024-0448 exposes websites to Stored Cross-Site Scripting (XSS) attacks by allowing users with at least contributor-level access to inject malicious scripts via the plugin's widget URL parameters. This flaw, discovered by the researcher known as Webbernaut, affects all versions of the plugin up to and including 8.3.1 and has been publicly disclosed since January 25, 2024.

The Risks and Potential Impacts

The vulnerability presents significant security risks, including unauthorized actions performed on behalf of users, data theft, session hijacking, and the spread of malware. The nature of Stored XSS means that the injected scripts can persist on the website, affecting multiple users over time and potentially damaging the site's reputation and user trust.

Remediation and Prevention

To mitigate the vulnerability, users must update the Elementor Addons plugin to version 8.3.2, which includes the necessary patches. Website administrators should also review their sites for any signs of compromise and remain vigilant for future updates. Considering alternative plugins with similar functionality may provide an additional layer of security, especially for those concerned about recurring vulnerabilities.

Historical Context: Learning from the Past

This is not the first time vulnerabilities have been found in the Elementor Addons plugin, with five previous instances reported since February 25, 2019. These historical vulnerabilities highlight the importance of continuous monitoring and updating as part of a proactive security strategy.

The Critical Importance of Vigilance in Web Security

For small business owners managing WordPress websites, the challenge of staying abreast of security updates can be daunting amidst myriad other responsibilities. However, the potential consequences of neglecting website security—from data breaches to loss of customer trust—can be far more burdensome. Leveraging automated update features within WordPress, utilizing security plugins, and occasionally consulting with cybersecurity professionals can significantly reduce the risk of vulnerabilities and ensure the continuous protection of your digital presence.

In conclusion, the discovery of CVE-2024-0448 in the Elementor Addons by Livemesh plugin is a critical reminder of the ever-present threats in the digital realm. Staying informed, regularly updating software, and adopting a proactive approach to website security are indispensable practices for safeguarding your online assets against potential vulnerabilities. For small business owners, prioritizing these practices not only protects their websites but also preserves their reputation and the trust of their customers in an increasingly interconnected world.

Staying Secure

Staying on top of WordPress security can feel overwhelming for small business owners without dedicated IT staff. At Your WP Guy, we exist to shoulder that burden for you. Our WordPress experts can fully audit, secure, maintain and support your site - so you can focus on growing your business with peace of mind.

Don't tackle security risks alone. Let us help you assess any impact from this vulnerability, update your plugins, and implement ongoing maintenance to avoid future threats. We treat your website like it's our own - because we know how critical it is for reaching your customers.

Get in touch for a free consultation today on making WordPress security stress-free. Call 678-995-5169 or book a call here. Our knowledgeable team is ready to help you safeguard your online presence.

Elementor Addons by Livemesh Vulnerability – Authenticated (Contributor+) Stored Cross-Site Scripting – CVE-2024-0448 |WordPress Plugin Vulnerability Report FAQs

Leave a Comment