CVE-2026-2724
Stored XSS in Unlimited Elements for Elementor Plugin Forms
Publication date: 2026-03-10
Last updated on: 2026-03-10
Assigner: Wordfence
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| unlimited_elements | unlimited_elements_for_elementor | to 2.0.5 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-79 | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
The Unlimited Elements for Elementor plugin for WordPress has a Stored Cross-Site Scripting (XSS) vulnerability in all versions up to and including 2.0.5. This vulnerability arises because the plugin does not properly sanitize or escape input submitted through form entry fields. As a result, an unauthenticated attacker can inject malicious scripts into form entries. These scripts execute whenever an administrator views the trashed form entries in the admin panel.
How can this vulnerability impact me? :
This vulnerability can allow an attacker to execute arbitrary web scripts in the context of the administrator's browser when they view the trashed form entries. This can lead to unauthorized actions such as stealing administrator session cookies, performing actions on behalf of the administrator, or injecting malicious content into the admin interface. Since the attacker does not need to be authenticated, it increases the risk of compromise.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
[{'type': 'paragraph', 'content': "This vulnerability involves stored Cross-Site Scripting (XSS) in the Unlimited Elements for Elementor plugin's form entry fields, specifically in the admin Form Entries Trash view. Detection involves checking for suspicious or unexpected script tags or JavaScript code within form entries, especially in the trashed entries viewed by administrators."}, {'type': 'paragraph', 'content': 'Since the vulnerability is related to stored XSS in form entries, one way to detect it is to inspect the contents of form entries in the WordPress admin panel, particularly those in the trash. Automated detection could involve querying the database for form entry data containing suspicious script tags or event handlers.'}, {'type': 'paragraph', 'content': 'Suggested commands to detect potential exploitation or presence of malicious scripts in form entries might include running SQL queries against the WordPress database to search for script tags in the form entries table, for example:'}, {'type': 'list_item', 'content': "SELECT * FROM wp_unitecreator_form_entries WHERE entry_value LIKE '%<script>%';"}, {'type': 'list_item', 'content': "grep -r --include='*.php' '<script>' /path/to/wordpress/wp-content/plugins/unlimited-elements-for-elementor/"}, {'type': 'paragraph', 'content': 'Additionally, monitoring HTTP requests for suspicious payloads that include script tags submitted to forms handled by the plugin could help detect attempts to exploit this vulnerability.'}] [2, 3]
What immediate steps should I take to mitigate this vulnerability?
[{'type': 'paragraph', 'content': "The primary mitigation step is to update the Unlimited Elements for Elementor plugin to version 2.0.6 or later, where the vulnerability has been addressed by sanitizing user input using WordPress's sanitize_textarea_field() function before storing form entries."}, {'type': 'paragraph', 'content': 'If immediate updating is not possible, administrators should avoid viewing the Form Entries Trash view to prevent execution of injected scripts.'}, {'type': 'paragraph', 'content': 'Additional mitigation steps include:'}, {'type': 'list_item', 'content': 'Implement Web Application Firewall (WAF) rules to block or sanitize malicious input containing script tags targeting the form submission endpoints.'}, {'type': 'list_item', 'content': 'Regularly audit and clean form entries, especially those in the trash, to remove any suspicious or malicious content.'}, {'type': 'list_item', 'content': 'Restrict administrative access to trusted users only, minimizing the risk of script execution when viewing form entries.'}] [2]