Ultimate Bootstrap Elements for Elementor

This information is sourced from wpvulnerabilities.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Vulnerabilities

  • Input validation vulnerability in Ultimate Bootstrap Elements for Elementor 1.3.6

    Fixed

    The Ultimate Bootstrap Elements for Elementor is a plugin for WordPress that has a security vulnerability. This vulnerability, known as Stored Cross-Site Scripting, allows attackers with certain perm...

    Read More
  • Input validation vulnerability in Ultimate Bootstrap Elements for Elementor 1.3.6

    Fixed

    The plugin called "Ultimate Bootstrap Elements for Elementor" on WordPress has a security issue. This means that the plugin does not properly protect against harmful code being added to certain parts...

    Read More
  • Input validation vulnerability in Ultimate Bootstrap Elements for Elementor 1.4.2

    Fixed

    A popular plugin for WordPress, called "Ultimate Bootstrap Elements for Elementor", has a security vulnerability. This means that anyone with contributor-level access or higher can include and run an...

    Read More
  • Input validation vulnerability in Ultimate Bootstrap Elements for Elementor 1.4.4

    Fixed

    A plugin called "Ultimate Bootstrap Elements for Elementor" in WordPress has a security issue in all versions up to 1.4.4. This means that people with certain levels of access can include and run any...

    Read More
  • Access violation vulnerability in Ultimate Bootstrap Elements for Elementor 1.4.6

    Fixed

    A popular plugin called "Ultimate Bootstrap Elements for Elementor" used on WordPress websites has a security issue. This means that anyone with access to the website, even at the Contributor level, ...

    Read More
  • Input validation vulnerability in Ultimate Bootstrap Elements for Elementor 1.4.9

    Fixed

    A plugin called "Ultimate Bootstrap Elements for Elementor" in WordPress has a security issue in versions 1.4.9 and below. This means that anyone who is not logged in can access and run files on the ...

    Read More