VYPR
Medium severity6.5NVD Advisory· Published Oct 6, 2024· Updated Apr 23, 2026

CVE-2024-47343

CVE-2024-47343

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Kraft Plugins Mega Elements mega-elements-addons-for-elementor allows Stored XSS.This issue affects Mega Elements: from n/a through <= 1.2.4.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Stored XSS in Kraft Plugins Mega Elements for Elementor (≤1.2.4) allows authenticated attackers to inject arbitrary scripts via improper input neutralization.

Vulnerability

Overview

The Mega Elements plugin for Elementor (versions up to 1.2.4) contains a stored cross-site scripting (XSS) vulnerability due to improper neutralization of user input during web page generation. This flaw allows an attacker to inject malicious scripts that are stored on the server and later executed when other users access the affected page [1].

Exploitation

Details

Exploitation requires an authenticated user with sufficient privileges (e.g., at least Contributor or Author role) to insert crafted content into the plugin's fields or forms. Unlike reflected XSS, the injected payload persists, meaning any subsequent visitor—including administrators—will trigger the script upon viewing the page. The Patchstack advisory notes that a privileged user action (such as clicking a link or submitting a form) is necessary for the attack to succeed, likely referring to the initial injection step [1].

Impact

Successful exploitation allows an attacker to execute arbitrary JavaScript in the context of the victim's browser. This can be used to redirect visitors to malicious sites, display unwanted advertisements, steal session cookies, or perform other actions that compromise the integrity of the website and its users [1].

Mitigation

Users are strongly advised to update the plugin to version 1.2.5 or later, which resolves the vulnerability. Patchstack recommends enabling auto-updates for vulnerable plugins. Given that this type of XSS is frequently used in mass-exploit campaigns, immediate action is recommended to reduce risk [1].

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.