Skip to main content

CVE-2025-3076: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in https://elementor.com/ Elementor Website Builder Pro

Medium
VulnerabilityCVE-2025-3076cvecve-2025-3076cwe-79
Published: Tue Jun 10 2025 (06/10/2025, 04:23:09 UTC)
Source: CVE Database V5
Vendor/Project: https://elementor.com/
Product: Elementor Website Builder Pro

Description

The Elementor Website Builder Pro plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘button_text’ parameter in all versions up to, and including, 3.29.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

AI-Powered Analysis

AILast updated: 07/11/2025, 00:48:33 UTC

Technical Analysis

CVE-2025-3076 is a Stored Cross-Site Scripting (XSS) vulnerability identified in the Elementor Website Builder Pro plugin for WordPress, affecting all versions up to and including 3.29.0. The vulnerability arises from improper input sanitization and output escaping of the 'button_text' parameter, which is used during web page generation. Authenticated attackers with Contributor-level access or higher can exploit this flaw by injecting arbitrary JavaScript code into pages. This malicious script executes whenever any user accesses the compromised page, potentially leading to session hijacking, credential theft, or unauthorized actions performed on behalf of the user. The vulnerability has a CVSS 3.1 base score of 6.4, indicating a medium severity level. The attack vector is network-based (remote), requires low attack complexity, and privileges at the Contributor level, but does not require user interaction. The scope is changed, meaning the vulnerability affects resources beyond the attacker’s privileges. No known exploits are currently reported in the wild. The vulnerability is classified under CWE-79, which pertains to improper neutralization of input during web page generation, a common vector for XSS attacks. Since Elementor is a widely used WordPress plugin for building websites, this vulnerability poses a significant risk to websites that allow contributors to add or edit content, as it enables persistent script injection that can affect all visitors to the compromised pages.

Potential Impact

For European organizations, this vulnerability can lead to significant risks including data leakage, user session compromise, and reputational damage. Organizations relying on WordPress sites built with Elementor Pro that allow contributor-level access to multiple users are particularly vulnerable. Attackers could leverage this vulnerability to execute malicious scripts that steal cookies, redirect users to phishing sites, or perform unauthorized actions within the context of authenticated users. This could impact customer trust and lead to regulatory consequences under GDPR if personal data is compromised. Additionally, the persistent nature of stored XSS means that the malicious payload remains active until the vulnerability is remediated, increasing the window of exposure. The medium severity score reflects the need for timely remediation, especially for organizations with high web traffic or sensitive user data. The vulnerability does not affect availability directly but compromises confidentiality and integrity, which are critical for maintaining secure web services.

Mitigation Recommendations

1. Immediate upgrade to the latest version of Elementor Website Builder Pro once a patch is released by the vendor. Since no patch links are currently available, organizations should monitor Elementor’s official channels for updates. 2. Restrict Contributor-level access strictly to trusted users and review user permissions regularly to minimize the risk of malicious insiders exploiting this vulnerability. 3. Implement Web Application Firewall (WAF) rules that detect and block suspicious input patterns targeting the 'button_text' parameter to provide temporary protection until a patch is applied. 4. Conduct thorough code reviews and input validation on any custom Elementor widgets or extensions that interact with user input to ensure proper sanitization and escaping. 5. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts and reduce the impact of potential XSS payloads. 6. Regularly scan websites for XSS vulnerabilities using automated tools and manual penetration testing to detect exploitation attempts. 7. Educate content contributors about the risks of injecting untrusted content and enforce strict content moderation policies.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-03-31T23:12:50.027Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68487f561b0bd07c3938a400

Added to database: 6/10/2025, 6:54:14 PM

Last enriched: 7/11/2025, 12:48:33 AM

Last updated: 8/14/2025, 10:22:46 AM

Views: 31

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats