Skip to main content

CVE-2025-1458: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in bdthemes Element Pack Addons for Elementor – Best Elementor addons with Ready Templates, Blocks, Widgets and WooCommerce Builder

Medium
VulnerabilityCVE-2025-1458cvecve-2025-1458cwe-79
Published: Sat Apr 26 2025 (04/26/2025, 05:34:23 UTC)
Source: CVE
Vendor/Project: bdthemes
Product: Element Pack Addons for Elementor – Best Elementor addons with Ready Templates, Blocks, Widgets and WooCommerce Builder

Description

The Element Pack Addons for Elementor – Free Templates and Widgets for Your WordPress Websites plugin for WordPress is vulnerable to Stored Cross-Site Scripting via several widgets like Dual Button, Creative Button, Image Stack and more in all versions up to, and including, 5.10.29 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

AI-Powered Analysis

AILast updated: 06/24/2025, 22:06:09 UTC

Technical Analysis

CVE-2025-1458 is a Stored Cross-Site Scripting (XSS) vulnerability affecting the WordPress plugin "Element Pack Addons for Elementor – Best Elementor addons with Ready Templates, Blocks, Widgets and WooCommerce Builder" developed by bdthemes. This plugin provides additional widgets and templates for the popular Elementor page builder. The vulnerability exists in all versions up to and including 5.10.29 due to improper neutralization of input during web page generation, specifically insufficient input sanitization and output escaping in several widgets such as Dual Button, Creative Button, and Image Stack. An authenticated attacker with Contributor-level privileges or higher can inject arbitrary malicious JavaScript code into pages via these vulnerable widgets. Because the injected scripts are stored persistently, they execute whenever any user accesses the compromised page, potentially leading to session hijacking, privilege escalation, or other malicious activities. The CVSS 3.1 base score is 6.4 (medium severity), with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), privileges required (PR:L), no user interaction (UI:N), scope changed (S:C), and low impact on confidentiality and integrity (C:L/I:L), with no impact on availability (A:N). No known exploits are currently in the wild, and no patches have been linked yet. The vulnerability stems from CWE-79, which is a common web application security flaw related to improper input validation and output encoding during dynamic page generation.

Potential Impact

For European organizations using WordPress websites enhanced with the Element Pack Addons for Elementor plugin, this vulnerability poses a significant risk. Attackers with contributor-level access—often content editors or similar roles—can inject malicious scripts that execute in the browsers of site visitors, including administrators and customers. This can lead to theft of authentication cookies, unauthorized actions on behalf of users, defacement, or distribution of malware. E-commerce sites using WooCommerce widgets are particularly at risk, as compromise could lead to theft of customer data or payment information. The scope of impact is broad because Elementor and its addons are widely used across Europe in sectors such as retail, media, education, and government. The vulnerability’s exploitation could undermine user trust, cause reputational damage, and lead to regulatory penalties under GDPR if personal data is compromised. The fact that exploitation requires authenticated access limits the attack surface somewhat but does not eliminate risk, especially in organizations with many contributors or weak internal access controls. The lack of user interaction needed for exploitation increases the risk of automated or stealthy attacks once credentials are obtained.

Mitigation Recommendations

1. Immediate mitigation involves restricting Contributor-level access strictly to trusted users and reviewing existing user roles to minimize privilege creep. 2. Implement strict input validation and output encoding at the application level for all user-generated content, especially in widgets known to be vulnerable. 3. Monitor and audit content changes made by contributors for suspicious or unexpected script injections. 4. Employ Web Application Firewalls (WAFs) with custom rules to detect and block typical XSS payloads targeting these widgets. 5. Encourage the plugin vendor to release a security patch promptly; until then, consider disabling or removing the vulnerable widgets if feasible. 6. Educate content editors and contributors about the risks of injecting untrusted content and enforce secure content creation policies. 7. Regularly update WordPress core, plugins, and themes to the latest versions once patches become available. 8. Use Content Security Policy (CSP) headers to restrict the execution of inline scripts and reduce the impact of XSS attacks. 9. Conduct periodic security assessments and penetration testing focusing on user input handling in WordPress environments.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-02-18T20:09:14.285Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d983dc4522896dcbef31f

Added to database: 5/21/2025, 9:09:17 AM

Last enriched: 6/24/2025, 10:06:09 PM

Last updated: 7/28/2025, 8:58:03 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats