Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13535: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in kingaddons King Addons for Elementor – 80+ Elementor Widgets, 4 000+ Elementor Templates, WooCommerce, Mega Menu, Popup Builder

0
Medium
VulnerabilityCVE-2025-13535cvecve-2025-13535cwe-79
Published: Wed Apr 01 2026 (04/01/2026, 14:37:34 UTC)
Source: CVE Database V5
Vendor/Project: kingaddons
Product: King Addons for Elementor – 80+ Elementor Widgets, 4 000+ Elementor Templates, WooCommerce, Mega Menu, Popup Builder

Description

The King Addons for Elementor plugin for WordPress is vulnerable to multiple Contributor+ DOM-Based Stored Cross-Site Scripting vulnerabilities in all versions up to, and including, 51.1.38. This is due to insufficient input sanitization and output escaping across multiple widgets and features. The plugin uses esc_attr() and esc_url() within JavaScript inline event handlers (onclick attributes), which allows HTML entities to be decoded by the DOM, enabling attackers to break out of the JavaScript context. Additionally, several JavaScript files use unsafe DOM manipulation methods (template literals, .html(), and window.location.href with unvalidated URLs) with user-controlled data. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts via Elementor widget settings that execute when a user accesses the injected page or when an administrator previews the page in Elementor's editor. The vulnerability was partially patched in version 5.1.51.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/02/2026, 12:12:30 UTC

Technical Analysis

CVE-2025-13535 is a DOM-based stored Cross-Site Scripting vulnerability identified in the King Addons for Elementor plugin, which provides over 80 Elementor widgets, thousands of templates, and features like WooCommerce integration, Mega Menu, and Popup Builder for WordPress. The vulnerability exists due to insufficient sanitization and escaping of user input in multiple widget settings and plugin features. Specifically, the plugin uses esc_attr() and esc_url() functions within inline JavaScript event handlers (such as onclick attributes), which do not prevent HTML entities from being decoded by the DOM, allowing attackers to break out of the JavaScript context. Additionally, several JavaScript files employ unsafe DOM manipulation techniques, including template literals, jQuery’s .html() method, and window.location.href assignments with unvalidated user-supplied URLs. These unsafe practices enable authenticated users with Contributor-level privileges or higher to inject arbitrary JavaScript code into widget settings. When a page containing the injected code is accessed or previewed in Elementor’s editor by an administrator or other users, the malicious script executes, potentially leading to session hijacking, privilege escalation, or unauthorized actions. The vulnerability affects all plugin versions up to and including 5.1.38, with a partial fix introduced in version 5.1.51. The CVSS v3.1 base score is 6.4, reflecting medium severity, with an attack vector of network, low attack complexity, requiring privileges (Contributor+), no user interaction, and scope change. No known exploits have been reported in the wild as of now. The vulnerability is tracked under CWE-79 (Improper Neutralization of Input During Web Page Generation).

Potential Impact

This vulnerability allows authenticated users with Contributor-level access or higher to inject malicious JavaScript code into WordPress pages via Elementor widgets. The injected scripts execute when the page is viewed or previewed by administrators or other users, potentially leading to session hijacking, theft of sensitive information, unauthorized actions within the WordPress admin interface, or further compromise of the website. Since Contributor-level users typically have limited permissions, this vulnerability effectively elevates their ability to execute cross-site scripting attacks, undermining the integrity and confidentiality of the site and its users. The impact is significant for organizations relying on King Addons for Elementor, especially those with multiple contributors or less stringent access controls. Exploitation could lead to defacement, data leakage, or pivoting to more severe attacks. The vulnerability does not affect availability directly but can disrupt trust and operational security.

Mitigation Recommendations

1. Immediately update the King Addons for Elementor plugin to the latest version beyond 5.1.51 where the vulnerability is partially patched; monitor vendor advisories for a full fix. 2. Restrict Contributor-level and higher privileges to trusted users only, minimizing the risk of malicious script injection. 3. Implement strict input validation and output encoding policies for all user-generated content within Elementor widgets, especially for inline JavaScript event handlers and DOM manipulation. 4. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts and reduce the impact of XSS attacks. 5. Regularly audit user roles and permissions in WordPress to ensure least privilege principles are enforced. 6. Use security plugins that detect and block XSS payloads or suspicious DOM manipulations. 7. Educate site administrators and developers about safe coding practices regarding JavaScript injection and DOM manipulation. 8. Monitor logs and user activity for unusual behavior indicative of exploitation attempts. 9. Consider isolating or sandboxing the plugin’s output where feasible to limit script execution scope.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-11-21T23:23:33.043Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69cd74cfe6bfc5ba1df01051

Added to database: 4/1/2026, 7:41:03 PM

Last enriched: 4/2/2026, 12:12:30 PM

Last updated: 4/4/2026, 8:19:17 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses