Elementor Website Builder <= 4.0.4 - Authenticated (Contributor+) Stored Cross-Site Scripting via REST API
The Elementor Website Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the _elementor_data meta field in versions up to, and including, 4.0.4. This is due to insufficient input sanitization when processing form-encoded REST API requests. The plugin registers the _elementor_data meta field with show_in_rest but omits a sanitize_callback, relying instead on a rest_pre_insert_post filter (sanitize_post_data function) that only sanitizes JSON-encoded request bodies. When a contributor sends a form-encoded PATCH request to the WordPress REST API, the json_decode() call on the raw body returns null, causing all sanitization to be skipped. The unsanitized data is then stored via update_post_meta() and later output without escaping through multiple widget sinks including the HTML widget's print_unescaped_setting() function. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
CVE-2026-6127 is a medium severity with CVSS 6.4 Stored Cross-Site Scripting issue affecting the Plugin Elementor Website Builder – more than just a page builder. It affects Versions up to 4.0.4 and is fixed in 4.0.5.
CVE-2026-6127 is tracked for the Plugin Elementor Website Builder – more than just a page builder as medium severity with CVSS 6.4. The affected range is Versions up to 4.0.4. Update Elementor Website Builder – more than just a page builder to 4.0.5 or newer where that version is compatible with the site.
| Software Type | Plugin |
|---|---|
| Software Slug |
elementor
View on wordpress.org
|
| CVE | CVE-2026-6127 |
| Patched Versions |
4.0.5
|
| Affected Versions |
Versions up to 4.0.4
|
Related CVEs for Elementor Website Builder – more than just a page builder
These internal links group the same WordPress plugin by CVE, issue type, severity, and patch status so operators and search engines can connect the full vulnerability cluster.
Elementor <= 3.19.0 - Authenticated(Contributor+) Arbitrary File Deletion and PHAR Deserialization
Elementor <= 3.18.1 - Authenticated(Contributor+) Arbitrary File Upload to Remote Code Execution via Template Import
Elementor Website Builder 3.6.0 - 3.6.2 - Missing Authorization to Remote Code Execution
Elementor Website Builder <= 2.7.4 - Arbitrary File Upload
Elementor Website Builder <= 1.7.12 - Missing Authorization
Elementor Website Builder <= 2.8.3 - Cross-Site Scripting
Elementor <= 3.12.1 - Authenticated(Administrator+) SQL Injection via 'replace_urls'
Elementor Website Builder <= 3.16.4 - Missing Authorization to Arbitrary Attachment Read
This record contains material that is subject to copyright
License: Defiant hereby grants you a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable copyright license to reproduce, prepare derivative works of, publicly display, publicly perform, sublicense, and distribute this software vulnerability information. Any copy of the software vulnerability information you make for such purposes is authorized provided that you include a hyperlink to this vulnerability record and reproduce Defiant's copyright designation and this license in any such copy. Read more
License: CVE Usage: MITRE hereby grants you a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable copyright license to reproduce, prepare derivative works of, publicly display, publicly perform, sublicense, and distribute Common Vulnerabilities and Exposures (CVE®). Any copy you make for such purposes is authorized provided that you reproduce MITRE's copyright designation and this license in any such copy. Read more