CVE-2026-2724
Received Received - Intake
Stored XSS in Unlimited Elements for Elementor Plugin Forms

Publication date: 2026-03-10

Last updated on: 2026-03-10

Assigner: Wordfence

Description
The Unlimited Elements for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the form entry fields in all versions up to, and including, 2.0.5. This is due to insufficient input sanitization and output escaping on form submission data displayed in the admin Form Entries Trash view. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever an administrator views the trashed form entries.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-10
Last Modified
2026-03-10
Generated
2026-05-07
AI Q&A
2026-03-10
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
unlimited_elements unlimited_elements_for_elementor to 2.0.5 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

The Unlimited Elements for Elementor plugin for WordPress has a Stored Cross-Site Scripting (XSS) vulnerability in all versions up to and including 2.0.5. This vulnerability arises because the plugin does not properly sanitize or escape input submitted through form entry fields. As a result, an unauthenticated attacker can inject malicious scripts into form entries. These scripts execute whenever an administrator views the trashed form entries in the admin panel.


How can this vulnerability impact me? :

This vulnerability can allow an attacker to execute arbitrary web scripts in the context of the administrator's browser when they view the trashed form entries. This can lead to unauthorized actions such as stealing administrator session cookies, performing actions on behalf of the administrator, or injecting malicious content into the admin interface. Since the attacker does not need to be authenticated, it increases the risk of compromise.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': "This vulnerability involves stored Cross-Site Scripting (XSS) in the Unlimited Elements for Elementor plugin's form entry fields, specifically in the admin Form Entries Trash view. Detection involves checking for suspicious or unexpected script tags or JavaScript code within form entries, especially in the trashed entries viewed by administrators."}, {'type': 'paragraph', 'content': 'Since the vulnerability is related to stored XSS in form entries, one way to detect it is to inspect the contents of form entries in the WordPress admin panel, particularly those in the trash. Automated detection could involve querying the database for form entry data containing suspicious script tags or event handlers.'}, {'type': 'paragraph', 'content': 'Suggested commands to detect potential exploitation or presence of malicious scripts in form entries might include running SQL queries against the WordPress database to search for script tags in the form entries table, for example:'}, {'type': 'list_item', 'content': "SELECT * FROM wp_unitecreator_form_entries WHERE entry_value LIKE '%<script>%';"}, {'type': 'list_item', 'content': "grep -r --include='*.php' '<script>' /path/to/wordpress/wp-content/plugins/unlimited-elements-for-elementor/"}, {'type': 'paragraph', 'content': 'Additionally, monitoring HTTP requests for suspicious payloads that include script tags submitted to forms handled by the plugin could help detect attempts to exploit this vulnerability.'}] [2, 3]


What immediate steps should I take to mitigate this vulnerability?

[{'type': 'paragraph', 'content': "The primary mitigation step is to update the Unlimited Elements for Elementor plugin to version 2.0.6 or later, where the vulnerability has been addressed by sanitizing user input using WordPress's sanitize_textarea_field() function before storing form entries."}, {'type': 'paragraph', 'content': 'If immediate updating is not possible, administrators should avoid viewing the Form Entries Trash view to prevent execution of injected scripts.'}, {'type': 'paragraph', 'content': 'Additional mitigation steps include:'}, {'type': 'list_item', 'content': 'Implement Web Application Firewall (WAF) rules to block or sanitize malicious input containing script tags targeting the form submission endpoints.'}, {'type': 'list_item', 'content': 'Regularly audit and clean form entries, especially those in the trash, to remove any suspicious or malicious content.'}, {'type': 'list_item', 'content': 'Restrict administrative access to trusted users only, minimizing the risk of script execution when viewing form entries.'}] [2]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart