CVE-2025-47476: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in add-ons.org Cost Calculator for Elementor
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in add-ons.org Cost Calculator for Elementor allows DOM-Based XSS. This issue affects Cost Calculator for Elementor: from n/a through 1.3.3.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2025-47476 is a Cross-site Scripting (XSS) flaw categorized under CWE-79, specifically a DOM-Based XSS vulnerability found in the Cost Calculator for Elementor plugin developed by add-ons.org. This plugin is used within the Elementor page builder environment on WordPress sites to provide cost calculation functionalities. The vulnerability affects versions up to and including 1.3.3. DOM-Based XSS occurs when client-side scripts write untrusted data to the Document Object Model (DOM) without proper sanitization or encoding, allowing an attacker to inject malicious scripts that execute in the context of the victim's browser. In this case, improper neutralization of input during web page generation enables attackers to craft malicious payloads that, when processed by the plugin, lead to script execution. The CVSS v3.1 score of 6.5 (medium severity) reflects that the vulnerability requires network access, low attack complexity, privileges (PR:L) meaning some level of authenticated access, and user interaction (UI:R) to exploit. The impact scope is changed (S:C), indicating that exploitation can affect resources beyond the vulnerable component. The consequences include partial loss of confidentiality, integrity, and availability, as malicious scripts could steal sensitive data, manipulate page content, or disrupt service. No known exploits are currently reported in the wild, and no patches have been linked yet. Given the plugin’s integration with WordPress and Elementor, widely used in website development, this vulnerability poses a risk to websites relying on this cost calculator functionality, potentially enabling attackers to compromise user sessions or perform phishing attacks via injected scripts.
Potential Impact
For European organizations, especially those operating e-commerce, service booking, or any online platforms utilizing the Cost Calculator for Elementor plugin, this vulnerability could lead to significant security risks. Exploitation can result in theft of user credentials, session hijacking, or unauthorized actions performed on behalf of users, undermining customer trust and potentially violating GDPR requirements concerning personal data protection. The medium severity and requirement for some privileges and user interaction mean that internal users or authenticated customers could be targeted to escalate attacks. Additionally, compromised websites could be used as vectors for broader attacks or to distribute malware, impacting brand reputation and causing operational disruptions. Organizations in sectors such as retail, travel, and professional services that rely on interactive cost calculators are particularly vulnerable. The lack of a patch at the time of publication increases the urgency for mitigation to prevent exploitation.
Mitigation Recommendations
European organizations should immediately audit their WordPress environments to identify installations of the Cost Calculator for Elementor plugin, particularly versions up to 1.3.3. Until an official patch is released, it is advisable to disable or remove the plugin if feasible, especially on high-risk or customer-facing sites. Implementing Web Application Firewall (WAF) rules that detect and block suspicious DOM-based XSS payloads targeting the plugin’s input vectors can provide interim protection. Organizations should also enforce strict Content Security Policy (CSP) headers to restrict script execution sources, limiting the impact of injected scripts. Regularly monitoring web server logs and user activity for anomalous behavior indicative of XSS exploitation attempts is recommended. Additionally, educating authenticated users about the risks of interacting with suspicious links or inputs can reduce the likelihood of successful exploitation. Once a patch is available, prompt application and testing in staging environments before production deployment are critical. Finally, maintaining up-to-date backups and incident response plans will help mitigate potential damage from exploitation.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-47476: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in add-ons.org Cost Calculator for Elementor
Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in add-ons.org Cost Calculator for Elementor allows DOM-Based XSS. This issue affects Cost Calculator for Elementor: from n/a through 1.3.3.
AI-Powered Analysis
Technical Analysis
The vulnerability identified as CVE-2025-47476 is a Cross-site Scripting (XSS) flaw categorized under CWE-79, specifically a DOM-Based XSS vulnerability found in the Cost Calculator for Elementor plugin developed by add-ons.org. This plugin is used within the Elementor page builder environment on WordPress sites to provide cost calculation functionalities. The vulnerability affects versions up to and including 1.3.3. DOM-Based XSS occurs when client-side scripts write untrusted data to the Document Object Model (DOM) without proper sanitization or encoding, allowing an attacker to inject malicious scripts that execute in the context of the victim's browser. In this case, improper neutralization of input during web page generation enables attackers to craft malicious payloads that, when processed by the plugin, lead to script execution. The CVSS v3.1 score of 6.5 (medium severity) reflects that the vulnerability requires network access, low attack complexity, privileges (PR:L) meaning some level of authenticated access, and user interaction (UI:R) to exploit. The impact scope is changed (S:C), indicating that exploitation can affect resources beyond the vulnerable component. The consequences include partial loss of confidentiality, integrity, and availability, as malicious scripts could steal sensitive data, manipulate page content, or disrupt service. No known exploits are currently reported in the wild, and no patches have been linked yet. Given the plugin’s integration with WordPress and Elementor, widely used in website development, this vulnerability poses a risk to websites relying on this cost calculator functionality, potentially enabling attackers to compromise user sessions or perform phishing attacks via injected scripts.
Potential Impact
For European organizations, especially those operating e-commerce, service booking, or any online platforms utilizing the Cost Calculator for Elementor plugin, this vulnerability could lead to significant security risks. Exploitation can result in theft of user credentials, session hijacking, or unauthorized actions performed on behalf of users, undermining customer trust and potentially violating GDPR requirements concerning personal data protection. The medium severity and requirement for some privileges and user interaction mean that internal users or authenticated customers could be targeted to escalate attacks. Additionally, compromised websites could be used as vectors for broader attacks or to distribute malware, impacting brand reputation and causing operational disruptions. Organizations in sectors such as retail, travel, and professional services that rely on interactive cost calculators are particularly vulnerable. The lack of a patch at the time of publication increases the urgency for mitigation to prevent exploitation.
Mitigation Recommendations
European organizations should immediately audit their WordPress environments to identify installations of the Cost Calculator for Elementor plugin, particularly versions up to 1.3.3. Until an official patch is released, it is advisable to disable or remove the plugin if feasible, especially on high-risk or customer-facing sites. Implementing Web Application Firewall (WAF) rules that detect and block suspicious DOM-based XSS payloads targeting the plugin’s input vectors can provide interim protection. Organizations should also enforce strict Content Security Policy (CSP) headers to restrict script execution sources, limiting the impact of injected scripts. Regularly monitoring web server logs and user activity for anomalous behavior indicative of XSS exploitation attempts is recommended. Additionally, educating authenticated users about the risks of interacting with suspicious links or inputs can reduce the likelihood of successful exploitation. Once a patch is available, prompt application and testing in staging environments before production deployment are critical. Finally, maintaining up-to-date backups and incident response plans will help mitigate potential damage from exploitation.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-05-07T09:38:59.114Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d981ac4522896dcbd94e9
Added to database: 5/21/2025, 9:08:42 AM
Last enriched: 7/5/2025, 12:26:32 PM
Last updated: 11/20/2025, 4:25:31 AM
Views: 32
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
RCE via a malicious SVG in mPDF
MediumCVE-2025-13451: SQL Injection in SourceCodester Online Shop Project
MediumCVE-2025-13450: Cross Site Scripting in SourceCodester Online Shop Project
MediumCVE-2025-13449: SQL Injection in code-projects Online Shop Project
MediumCVE-2025-13446: Stack-based Buffer Overflow in Tenda AC21
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.