CVE-2026-1572
Received Received - Intake
Stored XSS and Unauthorized Data Modification in Livemesh Addons Plugin

Publication date: 2026-04-16

Last updated on: 2026-04-16

Assigner: Wordfence

Description
The Livemesh Addons for Elementor plugin for WordPress is vulnerable to unauthorized modification of data and Stored Cross-Site Scripting via plugin settings in all versions up to, and including, 9.0. This is due to missing authorization checks on the AJAX handler `lae_admin_ajax()` and insufficient output escaping on multiple checkbox settings fields. This makes it possible for authenticated attackers, with Subscriber-level access and above, to inject arbitrary web scripts in the plugin settings page that will execute whenever an administrator accesses the plugin settings page granted they can obtain a valid nonce, which can be leaked via the plugin's improper access control on settings pages.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-16
Last Modified
2026-04-16
Generated
2026-05-07
AI Q&A
2026-04-16
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
livemesh addons_for_elementor to 9.0 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability be detected on my network or system? Can you suggest some commands?

Detection of this vulnerability involves checking for unauthorized modifications or injected scripts in the Livemesh Addons for Elementor plugin settings page. Since the vulnerability exploits missing authorization checks on the AJAX handler `lae_admin_ajax()` and insufficient output escaping on checkbox settings fields, monitoring AJAX requests to this handler for suspicious activity can help.

Commands to detect potential exploitation might include inspecting HTTP requests to the AJAX endpoint and searching for unusual parameters or payloads. For example, using curl or similar tools to simulate or monitor requests:

  • curl -v -X POST -d 'action=lae_admin_ajax&[other_parameters]' https://yourwordpresssite.com/wp-admin/admin-ajax.php
  • grep -r 'lae_admin_ajax' /path/to/wordpress/wp-content/plugins/livemesh-addons-for-elementor/

Additionally, reviewing logs for suspicious access patterns by users with Subscriber-level access or higher may help identify attempts to exploit the vulnerability.


Can you explain this vulnerability to me?

The Livemesh Addons for Elementor plugin for WordPress has a vulnerability that allows unauthorized modification of data and Stored Cross-Site Scripting (XSS) through its plugin settings. This occurs because the AJAX handler `lae_admin_ajax()` lacks proper authorization checks and multiple checkbox settings fields do not have sufficient output escaping.

As a result, authenticated attackers with Subscriber-level access or higher can inject arbitrary web scripts into the plugin settings page. These scripts execute whenever an administrator visits the plugin settings page, provided the attacker can obtain a valid nonce, which may be leaked due to improper access control on the settings pages.


How can this vulnerability impact me? :

This vulnerability can impact you by allowing attackers with low-level authenticated access to inject malicious scripts into the plugin settings page. These scripts execute in the context of an administrator's browser, potentially leading to unauthorized data modification and compromise of administrative functions.

Such exploitation could result in data integrity issues, unauthorized changes to plugin settings, and possibly further compromise of the WordPress site through the execution of arbitrary scripts.


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include updating the Livemesh Addons for Elementor plugin to a version later than 9.0 where the vulnerability is fixed.

If an update is not immediately available, restrict access to the plugin settings page to trusted administrators only, and monitor for suspicious activity.

Additionally, consider implementing Web Application Firewall (WAF) rules to block unauthorized AJAX requests to the `lae_admin_ajax()` handler.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability allows unauthorized modification of data and stored cross-site scripting (XSS) attacks via plugin settings, which could lead to unauthorized data access or manipulation.

Such unauthorized data modifications and potential data breaches may impact compliance with data protection regulations like GDPR and HIPAA, which require safeguarding personal and sensitive information against unauthorized access and alteration.

However, the provided information does not explicitly detail the direct compliance implications or specific regulatory impacts.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart