Master Addons For Elementor – White Label, Free Widgets, Hover Effe…

Master Addons For Elementor – White Label, Free Widgets, Hover Effe…

by | Feb 20, 2026 | Plugins

Attack Vectors

CVE-2026-2486 (Medium severity, CVSS 6.4) affects the WordPress plugin Master Addons For Elementor – White Label, Free Widgets, Hover Effects, Conditions, & Animations (slug: master-addons) in versions up to and including 2.1.1. The issue is an authenticated Stored Cross-Site Scripting (XSS) vulnerability that can be exploited by a logged-in user with Contributor-level permissions or higher.

The attack path is straightforward for an insider threat, compromised account, or overly-broad user role assignment: an attacker enters malicious script content through the ma_el_bh_table_btn_text parameter and saves it in a way that persists. Because it is stored, the injected script can run later whenever someone visits the affected page—without needing the victim to click a link or take a special action.

Security Weakness

The root cause is insufficient input sanitization and output escaping for the ma_el_bh_table_btn_text parameter in vulnerable versions. In business terms, this means untrusted content can be saved into a page and then displayed in a way that the browser treats as executable code.

This weakness is especially relevant for organizations that allow multiple team members, contractors, or agencies to contribute content. Even when these users are legitimate, any account takeover (phishing, password reuse, or malware) can turn routine publishing permissions into a reliable path to inject harmful scripts into customer-facing pages.

Technical or Business Impacts

Stored XSS can create measurable business risk because it occurs on your legitimate domain—where customers and employees inherently trust what they see. Potential impacts include brand damage (defaced content or malicious pop-ups), loss of customer trust, and campaign disruption if landing pages or high-traffic content are affected.

From an operational and compliance standpoint, this type of vulnerability can contribute to data exposure risk if scripts are used to capture sensitive information entered into forms, redirect visitors, or manipulate what users see. It can also increase the likelihood of incident response costs, including emergency remediation, forensic review, stakeholder communications, and potential contractual or regulatory scrutiny—especially if affected pages are used for lead capture, customer support, or account-related workflows.

Recommended remediation: Update Master Addons For Elementor to version 2.1.2 (or newer) to address CVE-2026-2486. Where possible, also review who has Contributor (or higher) access, enforce strong authentication practices, and monitor for unexpected content changes on key pages.

Similar Attacks

Stored XSS is a common and repeatedly exploited web risk across the industry. For additional context and real-world examples, see:

Cloudflare: Cross-Site Scripting (XSS)
OWASP: Cross Site Scripting (XSS)

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers