Description
The Royal Elementor Addons plugin for WordPress is vulnerable to Stored Cross-Site Scripting via image captions in the Image Grid/Slider/Carousel widget in versions up to and including 1.7.1056. This is due to insufficient output escaping in the render_post_thumbnail() function, where wp_kses_post() is used instead of esc_attr() for the alt attribute context. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses a page with the malicious image displayed in the media grid widget.
Published: 2026-04-24
Score: 6.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored XSS in Royal Elementor Addons
Action: Patch Now
AI Analysis

Impact

The Royal Elementor Addons plugin is vulnerable to stored cross-site scripting through image captions in the Image Grid/Slider/Carousel widget. The issue originates from insufficient escaping in the render_post_thumbnail() function, where wp_kses_post() is used for an attribute context instead of esc_attr(). This flaw allows authenticated users with Author role or higher to insert arbitrary JavaScript into image captions, which is then executed each time a page containing the malicious image is viewed by any user.

Affected Systems

Royal Addons for Elementor – Addons and Templates Kit for Elementor is affected in all releases up to and including 1.7.1056. The vulnerability exists in the Image Grid/Slider/Carousel widget.

Risk and Exploitability

The CVSS base score of 6.4 indicates moderate severity. EPSS <1% indicates a very low probability of exploitation in the wild, and the issue is not listed in the CISA KEV catalog. The attack can be carried out by any user with Author level or higher, who can modify image captions. Once a malicious caption is stored, any visitor who loads a page with the image will execute the injected script, enabling actions such as cookie theft, session hijacking, or defacement.

Generated by OpenCVE AI on April 28, 2026 at 06:57 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Royal Elementor Addons to version 1.7.1057 or newer.
  • Audit existing image captions in media grid widgets and delete any that contain suspicious or external script references.
  • Implement role restrictions to prevent authors from editing image captions if your site does not need rich caption content.

Generated by OpenCVE AI on April 28, 2026 at 06:57 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 27 Apr 2026 22:15:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Wproyal
Wproyal royal Addons For Elementor – Addons And Templates Kit For Elementor
Vendors & Products Wordpress
Wordpress wordpress
Wproyal
Wproyal royal Addons For Elementor – Addons And Templates Kit For Elementor

Fri, 24 Apr 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 24 Apr 2026 06:00:00 +0000

Type Values Removed Values Added
Description The Royal Elementor Addons plugin for WordPress is vulnerable to Stored Cross-Site Scripting via image captions in the Image Grid/Slider/Carousel widget in versions up to and including 1.7.1056. This is due to insufficient output escaping in the render_post_thumbnail() function, where wp_kses_post() is used instead of esc_attr() for the alt attribute context. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses a page with the malicious image displayed in the media grid widget.
Title Royal Addons for Elementor <= 1.7.1056 - Authenticated (Author+) Stored Cross-Site Scripting via Image Caption Field
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Wordpress Wordpress
Wproyal Royal Addons For Elementor – Addons And Templates Kit For Elementor
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-24T18:24:57.867Z

Reserved: 2026-04-02T14:30:44.825Z

Link: CVE-2026-5428

cve-icon Vulnrichment

Updated: 2026-04-24T18:24:49.210Z

cve-icon NVD

Status : Deferred

Published: 2026-04-24T06:16:08.643

Modified: 2026-04-24T14:38:26.740

Link: CVE-2026-5428

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T07:00:09Z

Weaknesses