Cyber Posture

CVE-2026-4803

High

Published: 05 May 2026

Published
05 May 2026
Modified
05 May 2026
KEV Added
Patch
CVSS Score 7.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
EPSS Score 0.0010 27.9th percentile
Risk Priority 14 60% EPSS · 20% KEV · 20% CVSS

Description

The Royal Elementor Addons plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'status' parameter in the wpr_update_form_action_meta AJAX action in all versions up to, and including, 1.7.1056. This is due to insufficient input sanitization and output escaping,…

more

combined with a publicly leaked nonce that allows unauthenticated access to the AJAX handler. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-79

Penetration testing submits XSS payloads to web applications, detecting cross-site scripting flaws for subsequent remediation.

addresses: CWE-79

Validates web inputs to reject script-related content that could produce XSS.

addresses: CWE-79

Output validation against expected content can reject or sanitize script content in generated web pages, reducing XSS exploitability.

Security SummaryAI

CVE-2026-4803 is a stored cross-site scripting (XSS) vulnerability in the Royal Elementor Addons plugin for WordPress, affecting all versions up to and including 1.7.1056. The flaw exists in the wpr_update_form_action_meta AJAX action, specifically via the 'status' parameter, due to insufficient input sanitization and output escaping. Additionally, a publicly leaked nonce enables unauthenticated access to the AJAX handler, allowing attackers to inject arbitrary web scripts into pages. The vulnerability is rated with a CVSS v3.1 base score of 7.2 (AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N) and is associated with CWE-79 (Cross-site Scripting).

Unauthenticated attackers can exploit this vulnerability remotely over the network with low complexity and no user interaction required. By sending crafted requests to the vulnerable AJAX endpoint, they can inject malicious scripts into form-related pages or submissions. These scripts execute in the context of any user, including administrators, who subsequently accesses the affected page, potentially leading to session hijacking, data theft, or further compromise of the WordPress site.

References provided include source code locations in the plugin's trac repository, such as wpr-actions-status.php (lines 21 and 73), wpr-submissions-cpt.php (line 23), and plugin.php (line 613), highlighting the vulnerable code paths. A specific changeset (3503219) in wpr-actions-status.php indicates a code modification, likely implementing a patch to address the issue. Security practitioners should update to a version beyond 1.7.1056 and review sites using this plugin for injected content.

Details

CWE(s)

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059.007 JavaScript Execution
Adversaries may abuse various implementations of JavaScript for execution.
T1185 Browser Session Hijacking Collection
Adversaries may take advantage of security vulnerabilities and inherent functionality in browser software to change content, modify user-behaviors, and intercept information as part of various browser session hijacking techniques.
Why these techniques?

Stored XSS in public-facing WordPress plugin directly enables remote exploitation of the application (T1190), arbitrary JavaScript execution via injected scripts (T1059.007), and session hijacking/data theft in the browser context (T1185).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

References