CVE-2025-3075: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in elemntor Elementor Website Builder – More Than Just a Page Builder
The Elementor Website Builder – More Than Just a Page Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'elementor-element' shortcode in all versions up to, and including, 3.29.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only impacts sites with 'Element Caching' enabled.
AI Analysis
Technical Summary
CVE-2025-3075 is a stored Cross-Site Scripting (XSS) vulnerability identified in the Elementor Website Builder plugin for WordPress, a widely used tool for creating and managing website content. This vulnerability arises from improper neutralization of input during web page generation, specifically within the 'elementor-element' shortcode. The root cause is insufficient input sanitization and output escaping of user-supplied attributes, which allows an authenticated attacker with contributor-level access or higher to inject arbitrary JavaScript code into pages. These malicious scripts are then stored and executed whenever any user accesses the compromised page. Notably, this vulnerability only affects sites that have the 'Element Caching' feature enabled, which likely influences how content is processed and cached, making the injection persistent. The vulnerability affects all versions up to and including 3.29.0 of the plugin. The CVSS v3.1 base score is 6.4, indicating a medium severity level, with an attack vector of network (remote exploitation), low attack complexity, requiring privileges (contributor or above), no user interaction needed, and a scope change, impacting confidentiality and integrity but not availability. Currently, there are no known exploits in the wild, and no official patches have been linked yet. The vulnerability is categorized under CWE-79, which is a common and critical web application security weakness related to XSS attacks.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the confidentiality and integrity of their web applications and user data. Since Elementor is a popular WordPress plugin used by many businesses, including e-commerce, media, and service providers, exploitation could lead to unauthorized script execution, enabling attackers to steal session cookies, perform actions on behalf of users, or deliver malicious payloads such as ransomware or phishing content. The requirement for contributor-level access means that attackers need some level of authenticated access, which might be obtained through compromised credentials or social engineering. The impact is heightened for organizations that rely on Elementor with 'Element Caching' enabled, as this setting makes the vulnerability exploitable. The persistent nature of stored XSS can affect all visitors to the compromised pages, potentially damaging brand reputation and violating data protection regulations such as GDPR if personal data is exposed or manipulated. Additionally, the scope change in the CVSS vector indicates that the vulnerability could affect components beyond the initially targeted plugin, potentially impacting the broader website environment.
Mitigation Recommendations
European organizations should take immediate steps to mitigate this vulnerability beyond generic patching advice. First, audit all WordPress sites using Elementor to identify those with versions up to 3.29.0 and verify if 'Element Caching' is enabled. Temporarily disable 'Element Caching' where feasible to reduce exposure until a patch is available. Restrict contributor-level access strictly by reviewing user roles and permissions, enforcing the principle of least privilege, and implementing multi-factor authentication (MFA) to reduce the risk of credential compromise. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious payloads targeting the 'elementor-element' shortcode. Conduct thorough input validation and output encoding on any custom code or third-party plugins interacting with Elementor elements. Monitor logs for unusual activity related to page content changes or script injections. Finally, maintain regular backups of website data to enable rapid recovery in case of compromise. Organizations should stay alert for official patches or updates from Elementor and apply them promptly once released.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-3075: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in elemntor Elementor Website Builder – More Than Just a Page Builder
Description
The Elementor Website Builder – More Than Just a Page Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'elementor-element' shortcode in all versions up to, and including, 3.29.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only impacts sites with 'Element Caching' enabled.
AI-Powered Analysis
Technical Analysis
CVE-2025-3075 is a stored Cross-Site Scripting (XSS) vulnerability identified in the Elementor Website Builder plugin for WordPress, a widely used tool for creating and managing website content. This vulnerability arises from improper neutralization of input during web page generation, specifically within the 'elementor-element' shortcode. The root cause is insufficient input sanitization and output escaping of user-supplied attributes, which allows an authenticated attacker with contributor-level access or higher to inject arbitrary JavaScript code into pages. These malicious scripts are then stored and executed whenever any user accesses the compromised page. Notably, this vulnerability only affects sites that have the 'Element Caching' feature enabled, which likely influences how content is processed and cached, making the injection persistent. The vulnerability affects all versions up to and including 3.29.0 of the plugin. The CVSS v3.1 base score is 6.4, indicating a medium severity level, with an attack vector of network (remote exploitation), low attack complexity, requiring privileges (contributor or above), no user interaction needed, and a scope change, impacting confidentiality and integrity but not availability. Currently, there are no known exploits in the wild, and no official patches have been linked yet. The vulnerability is categorized under CWE-79, which is a common and critical web application security weakness related to XSS attacks.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the confidentiality and integrity of their web applications and user data. Since Elementor is a popular WordPress plugin used by many businesses, including e-commerce, media, and service providers, exploitation could lead to unauthorized script execution, enabling attackers to steal session cookies, perform actions on behalf of users, or deliver malicious payloads such as ransomware or phishing content. The requirement for contributor-level access means that attackers need some level of authenticated access, which might be obtained through compromised credentials or social engineering. The impact is heightened for organizations that rely on Elementor with 'Element Caching' enabled, as this setting makes the vulnerability exploitable. The persistent nature of stored XSS can affect all visitors to the compromised pages, potentially damaging brand reputation and violating data protection regulations such as GDPR if personal data is exposed or manipulated. Additionally, the scope change in the CVSS vector indicates that the vulnerability could affect components beyond the initially targeted plugin, potentially impacting the broader website environment.
Mitigation Recommendations
European organizations should take immediate steps to mitigate this vulnerability beyond generic patching advice. First, audit all WordPress sites using Elementor to identify those with versions up to 3.29.0 and verify if 'Element Caching' is enabled. Temporarily disable 'Element Caching' where feasible to reduce exposure until a patch is available. Restrict contributor-level access strictly by reviewing user roles and permissions, enforcing the principle of least privilege, and implementing multi-factor authentication (MFA) to reduce the risk of credential compromise. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious payloads targeting the 'elementor-element' shortcode. Conduct thorough input validation and output encoding on any custom code or third-party plugins interacting with Elementor elements. Monitor logs for unusual activity related to page content changes or script injections. Finally, maintain regular backups of website data to enable rapid recovery in case of compromise. Organizations should stay alert for official patches or updates from Elementor and apply them promptly once released.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-03-31T22:47:22.418Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68884ee8ad5a09ad008b0612
Added to database: 7/29/2025, 4:32:40 AM
Last enriched: 7/29/2025, 4:48:20 AM
Last updated: 9/9/2025, 5:43:22 PM
Views: 34
Related Threats
CVE-2025-10386: Cross Site Scripting in Yida ECMS Consulting Enterprise Management System
MediumCVE-2025-10385: Buffer Overflow in Mercury KM08-708H GiGA WiFi Wave2
HighCVE-2025-10384: Improper Authorization in yangzongzhuan RuoYi
MediumCVE-2025-10374: Improper Authorization in Shenzhen Sixun Business Management System
MediumCVE-2025-10373: Cross Site Scripting in Portabilis i-Educar
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.