VYPR
Medium severity6.5NVD Advisory· Published Mar 13, 2026· Updated Apr 22, 2026

CVE-2026-32429

CVE-2026-32429

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Noor Alam Magical Addons For Elementor magical-addons-for-elementor allows Stored XSS.This issue affects Magical Addons For Elementor: from n/a through <= 1.4.1.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A stored XSS vulnerability in Magical Addons For Elementor allows attackers to inject malicious scripts via improper input neutralization, affecting versions up to 1.4.1.

Vulnerability

Overview

CVE-2026-32429 is a stored Cross-Site Scripting (XSS) vulnerability found in the Magical Addons For Elementor plugin for WordPress, affecting all versions from n/a through <= 1.4.1. The root cause is improper neutralization of user input during web page generation, allowing malicious payloads to be saved on the server and executed in the browsers of visitors.

Exploitation and

Attack Vector

This vulnerability can be initiated by an authenticated user with certain privileges, but successful exploitation requires a privileged user to perform an action such as clicking a malicious link or submitting a specially crafted form. This interaction leads to the injection and storage of malicious scripts within the website, which will then execute when any user visits the compromised page. The CVSS v3 score is 6.5 (Medium), reflecting the need for user interaction but with potential for broad impact.

Impact

An attacker exploiting this vulnerability can inject arbitrary scripts, redirecting visitors to malicious sites, serving unwanted advertisements, or stealing session cookies and other sensitive data. Because the XSS is stored, the payload remains persistent until removed, affecting all users who browse the affected content.

Mitigation

The vendor has addressed this issue in version 1.4.2. Users are strongly advised to update immediately. Plugin users with Patchstack can enable auto-updates for vulnerable plugins. Since this type of vulnerability is known to be used in mass-exploit campaigns, timely updating is critical [1].

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.