VYPR
Medium severity5.9NVD Advisory· Published Mar 13, 2026· Updated Apr 22, 2026

CVE-2026-32462

CVE-2026-32462

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Liton Arefin Master Addons for Elementor master-addons allows DOM-Based XSS.This issue affects Master Addons for Elementor: from n/a through <= 2.1.3.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

DOM-based XSS in Master Addons in Master Addons for Elementor ≤2.1.3 allows attackers to inject malicious scripts via crafted input, requiring user interaction.

Vulnerability

Overview

CVE-2026-32462 is a DOM-based Cross-Site Scripting (XSS) vulnerability found in the Master Addons for Elementor plugin for WordPress, affecting versions up to and including 2.1.3. The root cause is improper neutralization of user input during web page generation, allowing attackers to inject arbitrary JavaScript code that executes in the context of the victim's browser [1].

Exploitation

Conditions

Exploitation requires a privileged user (such as an administrator) to interact with a crafted link, visit a specially prepared page, or submit a form containing the malicious payload. The attack vector is network-based, and no special privileges besides user interaction are needed to trigger the vulnerability. The CVSS v3 score of 5.9 (Medium) reflects this need for user involvement and the potential for significant impact if exploited [1].

Potential

Impact

If successfully exploited, an attacker can inject malicious scripts, including redirects, advertisements, or other HTML payloads, which are executed when other visitors access the affected site. This can lead to site defacement, credential theft via redirected logins, or other client-side attacks. The vulnerability is noted to be part of mass-exploit campaigns targeting websites regardless of traffic size [1].

Mitigation and

Remediation

The vendor has released version 2.1.4 of the plugin, which contains a fix for this vulnerability. Users are strongly advised to update immediately. For those unable to update, they should contact their hosting provider or a web developer for assistance. Patchstack users can enable auto-update for vulnerable plugins. The advisory also notes that while the severity is considered low by some metrics, the risk of mass exploitation remains, necessitous prompt action [1].

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

1