Description
The Royal Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Instagram Feed widget's 'instagram_follow_text' setting in all versions up to, and including, 1.7.1056 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. Note that exploitation requires that an administrator has previously configured the Instagram Feed widget with a valid Instagram access token on the site.
Published: 2026-05-05
Score: 6.4 Medium
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Royal Addons for Elementor stores a follow‑link text field in the database without proper sanitization or escaping, allowing an attacker with contributor or higher access to inject malicious scripts that will run whenever the affected widget is rendered on a page. This can lead to session hijacking, credential theft, defacement or other malicious client‑side activity on any user who views the content.

Affected Systems

The vulnerability exists in the Royal Addons for Elementor plugin for WordPress, all releases up to and including version 1.7.1056. The affected product is the Instagram Feed widget, which requires that an administrator has configured it with a valid Instagram access token. Any WordPress site running a vulnerable version of this plugin is at risk.

Risk and Exploitability

The CVSS score of 6.4 indicates moderate severity, and the lack of an EPSS score means there is no publicly available data on current exploitation probability. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires the attacker to possess at least contributor-level credentials, which may be achieved through credential compromise or social engineering. Once access is achieved, the attacker can insert arbitrary scripts that will execute in the browsers of all visitors to the affected pages.

Generated by OpenCVE AI on May 5, 2026 at 05:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Royal Addons for Elementor plugin to a version newer than 1.7.1056 or install the latest security patch.
  • Remove or disable the Instagram Feed widget if it is not needed, or reset the follow‑text parameter to a safe value that has been verified as plain text.
  • Restrict contributor and higher role privileges to trusted users only, and regularly audit role assignments to prevent unauthorized account use.

Generated by OpenCVE AI on May 5, 2026 at 05:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 05 May 2026 07:45:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Wproyal
Wproyal royal Addons For Elementor – Addons And Templates Kit For Elementor
Vendors & Products Wordpress
Wordpress wordpress
Wproyal
Wproyal royal Addons For Elementor – Addons And Templates Kit For Elementor

Tue, 05 May 2026 04:00:00 +0000

Type Values Removed Values Added
Description The Royal Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Instagram Feed widget's 'instagram_follow_text' setting in all versions up to, and including, 1.7.1056 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. Note that exploitation requires that an administrator has previously configured the Instagram Feed widget with a valid Instagram access token on the site.
Title Royal Addons for Elementor <= 1.7.1056 - Authenticated (Contributor+) Stored Cross-Site Scripting via 'Follow Button Text' Parameter
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Wordpress Wordpress
Wproyal Royal Addons For Elementor – Addons And Templates Kit For Elementor
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-05-05T03:37:39.544Z

Reserved: 2026-03-30T14:12:40.826Z

Link: CVE-2026-5159

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-05T04:16:18.390

Modified: 2026-05-05T04:16:18.390

Link: CVE-2026-5159

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-05T07:30:18Z

Weaknesses