Master Addons For Elementor – Widgets, Extensions, Theme Builder, P…

Master Addons For Elementor – Widgets, Extensions, Theme Builder, P…

by | Mar 19, 2026 | Plugins

Attack Vectors

Product: Master Addons For Elementor – Widgets, Extensions, Theme Builder, Popup Builder & Template Kits (slug: master-addons)

Severity: Medium (CVSS 6.4) — CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N

This issue (CVE-2026-32462) is an authenticated stored cross-site scripting (XSS) vulnerability affecting plugin versions up to and including 2.1.3. An attacker must already have a WordPress account with Author-level permissions or higher to inject malicious script into content that uses the plugin’s functionality. Once injected, the script can execute when any user (including administrators, marketing staff, or site visitors) loads the affected page.

From a business-risk standpoint, this matters most on sites where multiple team members, agencies, contractors, or guest authors have publishing rights, or where accounts could be compromised through password reuse or phishing.

Security Weakness

The vulnerability stems from insufficient input sanitization and output escaping in the plugin, allowing attacker-supplied content to be stored and later rendered in the browser as executable script. Because it is stored (rather than reflected), the payload can persist on the site and affect multiple users until it is removed.

This issue is tracked as CVE-2026-32462. Source disclosure and technical summary are available from Wordfence: Wordfence vulnerability intelligence entry.

Remediation: Update Master Addons For Elementor – Widgets, Extensions, Theme Builder, Popup Builder & Template Kits to version 2.1.4 or newer (a patched version).

Technical or Business Impacts

A stored XSS vulnerability can create measurable business risk even when it requires an authenticated user. If a compromised or malicious Author-level account injects script into a landing page, blog post, or other high-traffic content, it can enable actions such as stealing session data, redirecting visitors to fraudulent sites, defacing content, or capturing form entries depending on what the injected script does and what users view the infected page.

For marketing directors and executives, the key impacts typically include brand damage (malicious popups/redirects on campaign pages), loss of lead integrity (tampered forms or analytics), and potential compliance exposure if customer data is mishandled. Because the CVSS vector indicates No User Interaction (UI:N) and a Changed Scope (S:C), the risk can extend beyond the original page context once the malicious script runs.

Similar attacks (real-world examples): Stored XSS has been repeatedly used to hijack CMS sessions, inject spam/SEO content, and redirect paid-traffic landing pages. For reference, see examples such as the WordPress contact-form related stored XSS issues reported by Patchstack (e.g., Contact Form 7 vulnerability database entries) and the broader history of stored XSS disclosures in WordPress ecosystems tracked by Wordfence (e.g., Wordfence Vulnerability Database).

Business-focused next steps: prioritize the plugin update to 2.1.4+, review who has Author (or higher) access, and confirm publishing workflows (including agency accounts) align with least-privilege practices to reduce the likelihood of authenticated content injection.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers