CVE-2024-38718
No known patch is available for this vulnerability.
The affected plugin has been removed from the WordPress.org directory (reason: Security Issue), and no patched version is being distributed through the official directory. If you have the affected software installed, you should uninstall or replace it rather than wait for an update.
Description
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in clicklabs® Medienagentur Download Button for Elementor allows Stored XSS.This issue affects Download Button for Elementor: from n/a through 1.2.1.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Stored XSS vulnerability in Download Button for Elementor WordPress plugin (≤1.2.1) allows attackers to inject malicious scripts via improper input neutralization.
Vulnerability
Overview
The Download Button for Elementor plugin for WordPress versions up to and including 1.2.1 contains a stored cross-site scripting (XSS) vulnerability due to improper neutralization of input during web page generation [1]. This flaw allows attackers to inject arbitrary web scripts into pages that are executed when other users access the affected page.
Exploitation
Exploitation requires a privileged user (e.g., administrator) to perform an action such as clicking a malicious link or submitting a crafted form. Once triggered, the injected script is stored and executed for subsequent visitors. The vulnerability can be initiated by roles with sufficient privileges, but successful execution depends on user interaction [1].
Impact
An attacker can inject malicious scripts, including redirects, advertisements, or other HTML payloads, which are executed in the context of the victim's browser when they visit the compromised site. This can lead to defacement, data theft, or further compromise of user sessions.
Mitigation
The vendor has not released a patched version; users should update the plugin to a safe version if available, or remove it. As a workaround, apply a web application firewall (WAF) rule to block malicious inputs. Given the active exploitation risk, immediate action is recommended [1].
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2- Range: <=1.2.1
- Range: <=1.2.1
Patches
0download-button-for-elementorThis plugin has been removed from the WordPress.org directory on 2024-07-10 (reason: Security Issue). No patched version is being distributed through the official directory. Users who have it installed should uninstall it.
Source: api.wordpress.org · directory page
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1News mentions
0No linked articles in our index yet.