<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-4803 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-4803/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 05 May 2026 04:16:18 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-4803/feed.xml" rel="self" type="application/rss+xml"/><item><title>Royal Elementor Addons Plugin Stored XSS Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-royal-elementor-xss/</link><pubDate>Tue, 05 May 2026 04:16:18 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-royal-elementor-xss/</guid><description>The Royal Elementor Addons plugin for WordPress is vulnerable to Stored Cross-Site Scripting (XSS) via the 'status' parameter in the wpr_update_form_action_meta AJAX action, allowing unauthenticated attackers to inject arbitrary web scripts into pages.</description><content:encoded><![CDATA[<p>The Royal Elementor Addons plugin for WordPress, in versions up to and including 1.7.1056, contains a stored Cross-Site Scripting (XSS) vulnerability. This vulnerability stems from a combination of insufficient input sanitization and output escaping of the &lsquo;status&rsquo; parameter within the wpr_update_form_action_meta AJAX action. Critically, the plugin also includes a publicly leaked nonce, granting unauthenticated access to the AJAX handler. An unauthenticated attacker can exploit this flaw to inject malicious JavaScript code into WordPress pages. When a user visits a page containing the injected script, the script executes within the user&rsquo;s browser, potentially leading to session hijacking, defacement, or other malicious actions. This vulnerability poses a significant risk to WordPress sites utilizing the Royal Elementor Addons plugin.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a WordPress site using a vulnerable version (&lt;= 1.7.1056) of the Royal Elementor Addons plugin.</li>
<li>The attacker crafts a malicious HTTP POST request targeting the WordPress AJAX endpoint (wp-admin/admin-ajax.php).</li>
<li>The POST request includes the action parameter set to &lsquo;wpr_update_form_action_meta&rsquo;.</li>
<li>The attacker includes the publicly leaked nonce value to bypass authentication checks for the AJAX action.</li>
<li>The attacker injects malicious JavaScript code within the &lsquo;status&rsquo; parameter of the POST request. The code is not properly sanitized by the plugin.</li>
<li>The server processes the request and stores the malicious script in the WordPress database.</li>
<li>A legitimate user visits a page where the injected content is displayed.</li>
<li>The malicious JavaScript code is executed within the user&rsquo;s browser, enabling the attacker to perform actions such as stealing cookies, redirecting the user, or defacing the website.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows unauthenticated attackers to inject arbitrary web scripts into WordPress pages. This can lead to a variety of malicious outcomes, including session hijacking, website defacement, and the execution of arbitrary code within the context of a user&rsquo;s browser. Given the widespread use of WordPress and the Royal Elementor Addons plugin, a successful mass exploitation could impact numerous websites and their users, leading to data breaches and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Royal Elementor Addons plugin to the latest version, which includes a fix for CVE-2026-4803.</li>
<li>Implement a web application firewall (WAF) rule to filter requests to wp-admin/admin-ajax.php containing suspicious JavaScript code in the &lsquo;status&rsquo; parameter.</li>
<li>Deploy the Sigma rule to detect exploitation attempts by monitoring for POST requests to the AJAX endpoint with malicious script content.</li>
<li>Review and audit existing WordPress installations for signs of compromise, such as unexpected script injections in pages or database entries.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>wordpress</category><category>xss</category><category>stored-xss</category><category>cve-2026-4803</category><category>royal-elementor</category></item></channel></rss>