Description
The Royal Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Instagram Feed widget's 'instagram_follow_text' setting in all versions up to, and including, 1.7.1056 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: 2026-04-17
Score: 6.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting through unescaped Instagram Feed widget input
Action: Apply Patch
AI Analysis

Impact

The Royal Addons for Elementor plugin contains a stored cross‑site scripting flaw in the instagram_follow_text setting of its Instagram Feed widget. The plugin does not properly sanitize or escape user input, allowing malicious code to be stored and later rendered when any visitor loads a page containing the widget.

Affected Systems

All installations of Royal Addons for Elementor – Addons and Templates Kit for Elementor, vendor wproyal, up to and including version 1.7.1056. Any WordPress site that uses the Instagram Feed widget is affected.

Risk and Exploitability

The CVSS base score is 6.4, indicating moderate severity. No EPSS score is available and the vulnerability is not listed in the CISA KEV catalog. Exploitation requires authenticated access with Contributor level or higher, typically granted to users who can contribute content. Once authenticated, an attacker can inject scripts that execute for every site visitor who views the affected page, making the attack practical in environments where contributor permissions are not tightly controlled.

Generated by OpenCVE AI on April 17, 2026 at 03:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Royal Addons for Elementor to a version newer than 1.7.1056
  • If updating is not possible, delete or disable the Instagram Feed widget and remove all existing instances from the site
  • Restrict Contributor or higher‑level users from editing widget settings or adding widgets that include the instagram_follow_text field

Generated by OpenCVE AI on April 17, 2026 at 03:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 17 Apr 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 17 Apr 2026 05:30:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Wproyal
Wproyal royal Addons For Elementor – Addons And Templates Kit For Elementor
Vendors & Products Wordpress
Wordpress wordpress
Wproyal
Wproyal royal Addons For Elementor – Addons And Templates Kit For Elementor

Fri, 17 Apr 2026 02:15:00 +0000

Type Values Removed Values Added
Description The Royal Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Instagram Feed widget's 'instagram_follow_text' setting in all versions up to, and including, 1.7.1056 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Title Royal Addons for Elementor <= 1.7.1056 - Authenticated (Contributor+) Stored Cross-Site Scripting via Instagram Feed Widget
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Wordpress Wordpress
Wproyal Royal Addons For Elementor – Addons And Templates Kit For Elementor
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-17T18:48:24.671Z

Reserved: 2026-03-30T14:33:28.467Z

Link: CVE-2026-5162

cve-icon Vulnrichment

Updated: 2026-04-17T18:48:19.055Z

cve-icon NVD

Status : Received

Published: 2026-04-17T02:16:06.073

Modified: 2026-04-17T02:16:06.073

Link: CVE-2026-5162

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T05:30:10Z

Weaknesses