Royal Elementor Addons and Templates – Authenticated (Contributor+) Stored Cross-Site Scripting via Logo Widget – CVE-2024-1500 | WordPress Plugin Vulnerability Report

Plugin Name: Royal Elementor Addons and Templates

Key Information:

  • Software Type: Plugin
  • Software Slug: royal-elementor-addons
  • Software Status: Active
  • Software Author: wproyal
  • Software Downloads: 4,248,687
  • Active Installs: 300,000
  • Last Updated: March 8, 2024
  • Patched Versions: Information not provided
  • Affected Versions: <= 1.3.91

Vulnerability Details:

  • Name: Royal Elementor Addons and Templates <= 1.3.91
  • Title: Authenticated (Contributor+) Stored Cross-Site Scripting via Logo Widget
  • Type: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
  • CVE: CVE-2024-1500
  • CVSS Score: 5.4
  • Publicly Published: March 6, 2024
  • Researcher: Webbernaut
  • Description: A significant vulnerability has been identified in the Royal Elementor Addons and Templates plugin, specifically within the Logo Widget. This flaw stems from inadequate input sanitization and output escaping of user-supplied URLs, enabling attackers with at least contributor-level access to embed malicious scripts into web pages. When these compromised pages are accessed, the injected scripts are executed, posing a serious security risk.


The Royal Elementor Addons and Templates plugin, a popular tool among WordPress users for enhancing Elementor with additional features and templates, has been compromised up to version 1.3.91. This vulnerability allows for Stored Cross-Site Scripting (XSS) through the Logo Widget, endangering websites by facilitating the injection and execution of arbitrary web scripts.

Detailed Overview:

This vulnerability was uncovered by the researcher Webbernaut, who highlighted the plugin's failure to properly sanitize and escape input in the Logo Widget's URL fields. Such vulnerabilities are particularly alarming as they can lead to unauthorized access, data breaches, and the potential manipulation of website content, affecting both website owners and their visitors. It is critical for users of the plugin to be aware of this security flaw and take the necessary steps to mitigate the risks involved.

Advice for Users:

  • Immediate Action: Users should check for updates and apply the latest version of the plugin as soon as it becomes available to address this vulnerability. If no patched version is specified, reaching out to the plugin developers or monitoring their official communication channels is advisable for updates.
  • Check for Signs of Vulnerability: Website administrators are encouraged to review their sites for any unusual content or behavior, which may indicate exploitation of this vulnerability.
  • Alternate Plugins: Considering alternative Elementor addons and templates that provide similar functionalities could be a prudent measure until a secure patch is released.
  • Stay Updated: Regularly updating all WordPress plugins and themes is essential to maintaining website security and protecting against known vulnerabilities.


The discovery of CVE-2024-1500 within the Royal Elementor Addons and Templates plugin underscores the critical importance of diligent software maintenance and the swift application of security updates. Website administrators using this plugin are strongly advised to take immediate action to secure their installations and safeguard their sites against potential exploits.


In the vast and evolving landscape of website development, plugins like Royal Elementor Addons and Templates have become indispensable tools, offering unparalleled versatility and creativity to WordPress users. However, the recent discovery of a significant vulnerability, CVE-2024-1500, within this widely-used plugin serves as a critical reminder of the ever-present need for vigilance in maintaining website security. This vulnerability not only underscores the potential risks associated with outdated software but also highlights the importance of prompt action to protect digital assets and user trust.

Plugin Overview:

Royal Elementor Addons and Templates, developed by wproyal, is a popular plugin designed to enhance the Elementor page builder with additional features and templates. With over 4 million downloads and 300,000 active installations, its impact on the WordPress community is substantial, making any vulnerabilities within it a concern for a vast number of website owners.

Vulnerability Details:

The identified vulnerability, CVE-2024-1500, pertains to Stored Cross-Site Scripting (XSS) via the Logo Widget in versions up to and including 1.3.91. This flaw arises from the plugin's inadequate sanitization and escaping of user-supplied URLs, allowing attackers with contributor-level access or higher to inject malicious scripts into web pages. When these pages are accessed, the scripts execute, potentially compromising the site and its visitors.

Risks and Potential Impacts:

The execution of malicious scripts can lead to a range of detrimental outcomes, from the theft of sensitive information and unauthorized access to user accounts, to the distribution of malware and the defacement of websites. For small business owners, such breaches can result in significant reputational damage, loss of customer trust, and potential legal ramifications.

Remediation and Prevention:

To mitigate the risks posed by CVE-2024-1500, users of the plugin must urgently update to the latest version, where the vulnerability has been addressed. In the absence of a specified patched version, it's crucial to stay informed through the plugin developer's official channels for updates. Additionally, website administrators should regularly review their sites for signs of compromise and consider employing security best practices, such as using reputable security plugins and conducting regular backups.

Previous Vulnerabilities:

The Royal Elementor Addons and Templates plugin has encountered 28 vulnerabilities since March 4, 2022, illustrating the ongoing challenges in software security and the importance of continuous monitoring and updating.

In conclusion, the discovery of CVE-2024-1500 within the Royal Elementor Addons and Templates plugin serves as a stark reminder of the critical importance of staying abreast of security vulnerabilities and taking proactive measures to ensure the safety of WordPress installations. For small business owners, whose resources may be limited, leveraging automated security solutions, maintaining regular updates, and fostering a culture of security awareness can provide a strong defense against the evolving threats in the digital landscape.

Staying Secure

Staying on top of WordPress security can feel overwhelming for small business owners without dedicated IT staff. At Your WP Guy, we exist to shoulder that burden for you. Our WordPress experts can fully audit, secure, maintain and support your site - so you can focus on growing your business with peace of mind.

Don't tackle security risks alone. Let us help you assess any impact from this vulnerability, update your plugins, and implement ongoing maintenance to avoid future threats. We treat your website like it's our own - because we know how critical it is for reaching your customers.

Get in touch for a free consultation today on making WordPress security stress-free. Call 678-995-5169 or book a call here. Our knowledgeable team is ready to help you safeguard your online presence.

Royal Elementor Addons and Templates – Authenticated (Contributor+) Stored Cross-Site Scripting via Logo Widget – CVE-2024-1500 | WordPress Plugin Vulnerability Report FAQs

Leave a Comment