Mega Elements – Addons for Elementor

This information is sourced from wpvulnerabilities.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Vulnerabilities

  • Input validation vulnerability in Mega Elements – Addons for Elementor 1.2.2

    Fixed

    The Mega Elements plugin for WordPress has a security issue in versions 1.2.2 and below. This can be exploited by attackers who have contributor-level access or higher. They are able to add harmful w...

    Read More
  • Input validation vulnerability in Mega Elements – Addons for Elementor 1.2.4

    Fixed

    The Mega Elements plugin for WordPress has a security issue in versions 1.2.4 and lower. This makes it possible for attackers who are logged in with contributor-level access or higher to inject harmf...

    Read More
  • Input validation vulnerability in Mega Elements – Addons for Elementor 1.2.6

    Fixed

    The Mega Elements plugin for WordPress has a security issue called Stored Cross-Site Scripting. This can happen in versions 1.2.6 and below because the plugin does not properly clean or filter the in...

    Read More
  • Input validation vulnerability in Mega Elements – Addons for Elementor 1.3.2

    Fixed

    The Mega Elements plugin for WordPress, which is used with Elementor, has a security issue where malicious code can be injected through the Countdown Timer widget. This can happen in all versions up ...

    Read More
  • Input validation vulnerability in Mega Elements – Addons for Elementor 1.1.9

    Fixed

    The Mega Elements plugin for WordPress has a security issue called Stored Cross-Site Scripting, which affects versions 1.1.9 and below. This happens because the plugin does not properly clean up any ...

    Read More
  • Input validation vulnerability in Mega Elements – Addons for Elementor 1.2.1

    Fixed

    The Mega Elements plugin for WordPress has a security issue that allows hackers to inject malicious scripts onto web pages. This can happen when someone with contributor-level access or higher uses t...

    Read More