VYPR
Medium severity6.5NVD Advisory· Published Apr 8, 2026· Updated Apr 24, 2026

CVE-2026-39703

CVE-2026-39703

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in wpbits WPBITS Addons For Elementor Page Builder wpbits-addons-for-elementor allows Stored XSS.This issue affects WPBITS Addons For Elementor Page Builder: from n/a through <= 1.8.1.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Stored XSS in WPBITS Addons For Elementor Page Builder up to 1.8.1 allows unauthenticated script injection via improper input sanitization.

Root

Cause

The WPBITS Addons For Elementor Page Builder plugin for WordPress fails to properly neutralize user input during web page generation, leading to a stored cross-site scripting (XSS) vulnerability. Versions from n/a through 1.8.1 are affected [1]. The wpbits-addons-for-elementor plugin does not sanitize or escape certain inputs before storing them, enabling attackers to inject persistent malicious scripts [1].

Exploitation

An attacker with low-level privileges can inject arbitrary HTML and JavaScript payloads into the page builder elements. When a privileged user (such as an admin) later views or edits the affected content, the stored payload executes in their browser. User interaction is required — the victim must perform an action like clicking a link or submitting a form, but the stored nature of the XSS makes this likely in normal workflows [1]. No authentication beyond a subscriber role is needed to inject the payload [1].

Impact

Successful exploitation allows the attacker to inject scripts that can redirect visitors, display advertisements, steal session cookies, or perform other malicious actions in the context of the victim's browser. Because the XSS is stored, any visitor to the affected page will execute the injected script, potentially compromising the entire site's integrity and user trust [1].

Mitigation

The vendor has not released a patched version at the time of publication; the vulnerability affects all versions up to and including 1.8.1. The recommended action is to update the plugin as soon as a patch becomes available. If immediate updating is not possible, site administrators should restrict contributor-level access and review any custom Elementor widgets for untrusted input. This CVE is not listed in the CISA Known Exploited Vulnerabilities catalog as of the publication date [1].

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.