CVE-2025-13535: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in kingaddons King Addons for Elementor – 80+ Elementor Widgets, 4 000+ Elementor Templates, WooCommerce, Mega Menu, Popup Builder
The King Addons for Elementor plugin for WordPress is vulnerable to multiple Contributor+ DOM-Based Stored Cross-Site Scripting vulnerabilities in all versions up to, and including, 51.1.38. This is due to insufficient input sanitization and output escaping across multiple widgets and features. The plugin uses esc_attr() and esc_url() within JavaScript inline event handlers (onclick attributes), which allows HTML entities to be decoded by the DOM, enabling attackers to break out of the JavaScript context. Additionally, several JavaScript files use unsafe DOM manipulation methods (template literals, .html(), and window.location.href with unvalidated URLs) with user-controlled data. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts via Elementor widget settings that execute when a user accesses the injected page or when an administrator previews the page in Elementor's editor. The vulnerability was partially patched in version 5.1.51.
AI Analysis
Technical Summary
CVE-2025-13535 is a DOM-Based Stored Cross-Site Scripting vulnerability in King Addons for Elementor plugin for WordPress, affecting all versions up to 51.1.38. The root cause is insufficient input sanitization and output escaping in multiple widgets and features, including misuse of esc_attr() and esc_url() in JavaScript inline event handlers (onclick attributes), which allows HTML entities to be decoded by the DOM and enables attackers to break out of the JavaScript context. Additionally, unsafe DOM manipulation methods such as template literals, .html(), and window.location.href with unvalidated URLs are used with user-controlled data. Authenticated users with Contributor-level access or higher can inject arbitrary scripts via Elementor widget settings, which execute when the page is viewed or previewed in the Elementor editor. A partial fix was implemented in version 5.1.51. The vulnerability has a CVSS 3.1 base score of 6.4 (medium severity) with network attack vector, low attack complexity, privileges required, no user interaction, and impacts on confidentiality and integrity but not availability.
Potential Impact
An authenticated attacker with Contributor-level or higher privileges can inject arbitrary web scripts that execute in the context of users viewing or previewing the affected pages. This can lead to partial confidentiality and integrity impacts, such as theft of sensitive information or manipulation of page content. There is no impact on availability. The vulnerability affects all versions up to and including 51.1.38, with a partial patch released in version 5.1.51. No known exploits in the wild have been reported.
Mitigation Recommendations
A partial patch addressing this vulnerability was released in version 5.1.51 of King Addons for Elementor. Users should upgrade to version 5.1.51 or later to benefit from the partial fix. Since the patch is partial, users should monitor vendor advisories for further updates or complete fixes. Until fully patched, restrict Contributor-level access to trusted users only. Patch status is not yet fully confirmed; check the vendor advisory for the latest remediation guidance.
CVE-2025-13535: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in kingaddons King Addons for Elementor – 80+ Elementor Widgets, 4 000+ Elementor Templates, WooCommerce, Mega Menu, Popup Builder
Description
The King Addons for Elementor plugin for WordPress is vulnerable to multiple Contributor+ DOM-Based Stored Cross-Site Scripting vulnerabilities in all versions up to, and including, 51.1.38. This is due to insufficient input sanitization and output escaping across multiple widgets and features. The plugin uses esc_attr() and esc_url() within JavaScript inline event handlers (onclick attributes), which allows HTML entities to be decoded by the DOM, enabling attackers to break out of the JavaScript context. Additionally, several JavaScript files use unsafe DOM manipulation methods (template literals, .html(), and window.location.href with unvalidated URLs) with user-controlled data. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts via Elementor widget settings that execute when a user accesses the injected page or when an administrator previews the page in Elementor's editor. The vulnerability was partially patched in version 5.1.51.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-13535 is a DOM-Based Stored Cross-Site Scripting vulnerability in King Addons for Elementor plugin for WordPress, affecting all versions up to 51.1.38. The root cause is insufficient input sanitization and output escaping in multiple widgets and features, including misuse of esc_attr() and esc_url() in JavaScript inline event handlers (onclick attributes), which allows HTML entities to be decoded by the DOM and enables attackers to break out of the JavaScript context. Additionally, unsafe DOM manipulation methods such as template literals, .html(), and window.location.href with unvalidated URLs are used with user-controlled data. Authenticated users with Contributor-level access or higher can inject arbitrary scripts via Elementor widget settings, which execute when the page is viewed or previewed in the Elementor editor. A partial fix was implemented in version 5.1.51. The vulnerability has a CVSS 3.1 base score of 6.4 (medium severity) with network attack vector, low attack complexity, privileges required, no user interaction, and impacts on confidentiality and integrity but not availability.
Potential Impact
An authenticated attacker with Contributor-level or higher privileges can inject arbitrary web scripts that execute in the context of users viewing or previewing the affected pages. This can lead to partial confidentiality and integrity impacts, such as theft of sensitive information or manipulation of page content. There is no impact on availability. The vulnerability affects all versions up to and including 51.1.38, with a partial patch released in version 5.1.51. No known exploits in the wild have been reported.
Mitigation Recommendations
A partial patch addressing this vulnerability was released in version 5.1.51 of King Addons for Elementor. Users should upgrade to version 5.1.51 or later to benefit from the partial fix. Since the patch is partial, users should monitor vendor advisories for further updates or complete fixes. Until fully patched, restrict Contributor-level access to trusted users only. Patch status is not yet fully confirmed; check the vendor advisory for the latest remediation guidance.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-11-21T23:23:33.043Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69cd74cfe6bfc5ba1df01051
Added to database: 4/1/2026, 7:41:03 PM
Last enriched: 4/9/2026, 4:31:29 PM
Last updated: 5/20/2026, 9:41:25 PM
Views: 20
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.