CVE-2025-46472: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in webangon The Pack Elementor addons
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in webangon The Pack Elementor addons allows Stored XSS. This issue affects The Pack Elementor addons: from n/a through 2.1.2.
AI Analysis
Technical Summary
CVE-2025-46472 is a Stored Cross-Site Scripting (XSS) vulnerability classified under CWE-79, affecting the WordPress plugin 'The Pack Elementor addons' developed by webangon. This vulnerability arises from improper neutralization of input during web page generation, allowing malicious actors to inject and store arbitrary JavaScript code within the plugin's data fields. When a victim visits a page rendered by the vulnerable plugin, the malicious script executes in the context of the victim's browser. This can lead to session hijacking, credential theft, unauthorized actions on behalf of the user, or distribution of malware. The vulnerability affects all versions up to and including 2.1.2, with no patch currently available as of the published date (April 24, 2025). No known exploits have been reported in the wild yet, but the nature of stored XSS makes it a significant risk once weaponized. The plugin is commonly used to extend Elementor, a popular WordPress page builder, which is widely deployed across many websites, including those of European organizations. The lack of authentication requirements for exploitation depends on the plugin’s configuration and the context in which user input is accepted and stored. Given the stored nature of the XSS, the attack vector typically involves tricking an administrator or content editor into entering malicious content or exploiting user-generated content fields. The vulnerability’s medium severity rating reflects the moderate difficulty of exploitation and the potential impact on confidentiality and integrity of user sessions and data.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, especially for those relying on WordPress sites enhanced by The Pack Elementor addons for public-facing or internal portals. Successful exploitation could lead to theft of user credentials, including those of administrators, enabling further compromise of the website or backend systems. This could result in defacement, data leakage, or unauthorized administrative actions. Additionally, attackers could use the vulnerability to distribute malware or phishing content to site visitors, damaging organizational reputation and potentially violating GDPR requirements related to data protection and breach notification. The impact is particularly critical for sectors with high reliance on web presence such as e-commerce, media, education, and government services. Since stored XSS can affect any user visiting the compromised page, the scope includes all site visitors, increasing the risk of widespread impact. The vulnerability also poses risks to internal users if the plugin is used on intranet or employee portals, potentially leading to lateral movement within corporate networks.
Mitigation Recommendations
1. Immediate mitigation involves disabling or removing The Pack Elementor addons plugin until a security patch is released. 2. Implement strict input validation and output encoding on all user-supplied data fields within the plugin’s configuration or content areas to prevent injection of malicious scripts. 3. Employ Content Security Policy (CSP) headers to restrict execution of unauthorized scripts in browsers accessing the affected sites. 4. Monitor web server and application logs for unusual input patterns or script injection attempts targeting the plugin. 5. Educate site administrators and content editors about the risks of entering untrusted content and encourage use of trusted sources only. 6. Regularly back up website data and configurations to enable quick restoration in case of compromise. 7. Once a patch is available, prioritize prompt update of the plugin to the fixed version. 8. Conduct security audits and penetration testing focusing on web application vulnerabilities, especially XSS, to identify and remediate similar issues proactively.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden, Belgium, Austria
CVE-2025-46472: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in webangon The Pack Elementor addons
Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in webangon The Pack Elementor addons allows Stored XSS. This issue affects The Pack Elementor addons: from n/a through 2.1.2.
AI-Powered Analysis
Technical Analysis
CVE-2025-46472 is a Stored Cross-Site Scripting (XSS) vulnerability classified under CWE-79, affecting the WordPress plugin 'The Pack Elementor addons' developed by webangon. This vulnerability arises from improper neutralization of input during web page generation, allowing malicious actors to inject and store arbitrary JavaScript code within the plugin's data fields. When a victim visits a page rendered by the vulnerable plugin, the malicious script executes in the context of the victim's browser. This can lead to session hijacking, credential theft, unauthorized actions on behalf of the user, or distribution of malware. The vulnerability affects all versions up to and including 2.1.2, with no patch currently available as of the published date (April 24, 2025). No known exploits have been reported in the wild yet, but the nature of stored XSS makes it a significant risk once weaponized. The plugin is commonly used to extend Elementor, a popular WordPress page builder, which is widely deployed across many websites, including those of European organizations. The lack of authentication requirements for exploitation depends on the plugin’s configuration and the context in which user input is accepted and stored. Given the stored nature of the XSS, the attack vector typically involves tricking an administrator or content editor into entering malicious content or exploiting user-generated content fields. The vulnerability’s medium severity rating reflects the moderate difficulty of exploitation and the potential impact on confidentiality and integrity of user sessions and data.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, especially for those relying on WordPress sites enhanced by The Pack Elementor addons for public-facing or internal portals. Successful exploitation could lead to theft of user credentials, including those of administrators, enabling further compromise of the website or backend systems. This could result in defacement, data leakage, or unauthorized administrative actions. Additionally, attackers could use the vulnerability to distribute malware or phishing content to site visitors, damaging organizational reputation and potentially violating GDPR requirements related to data protection and breach notification. The impact is particularly critical for sectors with high reliance on web presence such as e-commerce, media, education, and government services. Since stored XSS can affect any user visiting the compromised page, the scope includes all site visitors, increasing the risk of widespread impact. The vulnerability also poses risks to internal users if the plugin is used on intranet or employee portals, potentially leading to lateral movement within corporate networks.
Mitigation Recommendations
1. Immediate mitigation involves disabling or removing The Pack Elementor addons plugin until a security patch is released. 2. Implement strict input validation and output encoding on all user-supplied data fields within the plugin’s configuration or content areas to prevent injection of malicious scripts. 3. Employ Content Security Policy (CSP) headers to restrict execution of unauthorized scripts in browsers accessing the affected sites. 4. Monitor web server and application logs for unusual input patterns or script injection attempts targeting the plugin. 5. Educate site administrators and content editors about the risks of entering untrusted content and encourage use of trusted sources only. 6. Regularly back up website data and configurations to enable quick restoration in case of compromise. 7. Once a patch is available, prioritize prompt update of the plugin to the fixed version. 8. Conduct security audits and penetration testing focusing on web application vulnerabilities, especially XSS, to identify and remediate similar issues proactively.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-04-24T14:22:38.654Z
- Cisa Enriched
- true
Threat ID: 682d983fc4522896dcbf06eb
Added to database: 5/21/2025, 9:09:19 AM
Last enriched: 6/24/2025, 10:42:07 AM
Last updated: 7/27/2025, 12:21:49 AM
Views: 10
Related Threats
CVE-2025-8874: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in litonice13 Master Addons – Elementor Addons with White Label, Free Widgets, Hover Effects, Conditions, & Animations
MediumCVE-2025-8767: CWE-1236 Improper Neutralization of Formula Elements in a CSV File in anwppro AnWP Football Leagues
MediumCVE-2025-8482: CWE-862 Missing Authorization in 10up Simple Local Avatars
MediumCVE-2025-8418: CWE-862 Missing Authorization in bplugins B Slider- Gutenberg Slider Block for WP
HighCVE-2025-47444: CWE-201 Insertion of Sensitive Information Into Sent Data in Liquid Web GiveWP
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.