Skip to main content

CVE-2025-47476: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in add-ons.org Cost Calculator for Elementor

Medium
VulnerabilityCVE-2025-47476cvecve-2025-47476cwe-79
Published: Wed May 07 2025 (05/07/2025, 14:19:46 UTC)
Source: CVE
Vendor/Project: add-ons.org
Product: Cost Calculator for Elementor

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in add-ons.org Cost Calculator for Elementor allows DOM-Based XSS. This issue affects Cost Calculator for Elementor: from n/a through 1.3.3.

AI-Powered Analysis

AILast updated: 07/05/2025, 12:26:32 UTC

Technical Analysis

The vulnerability identified as CVE-2025-47476 is a Cross-site Scripting (XSS) flaw categorized under CWE-79, specifically a DOM-Based XSS vulnerability found in the Cost Calculator for Elementor plugin developed by add-ons.org. This plugin is used within the Elementor page builder environment on WordPress sites to provide cost calculation functionalities. The vulnerability affects versions up to and including 1.3.3. DOM-Based XSS occurs when client-side scripts write untrusted data to the Document Object Model (DOM) without proper sanitization or encoding, allowing an attacker to inject malicious scripts that execute in the context of the victim's browser. In this case, improper neutralization of input during web page generation enables attackers to craft malicious payloads that, when processed by the plugin, lead to script execution. The CVSS v3.1 score of 6.5 (medium severity) reflects that the vulnerability requires network access, low attack complexity, privileges (PR:L) meaning some level of authenticated access, and user interaction (UI:R) to exploit. The impact scope is changed (S:C), indicating that exploitation can affect resources beyond the vulnerable component. The consequences include partial loss of confidentiality, integrity, and availability, as malicious scripts could steal sensitive data, manipulate page content, or disrupt service. No known exploits are currently reported in the wild, and no patches have been linked yet. Given the plugin’s integration with WordPress and Elementor, widely used in website development, this vulnerability poses a risk to websites relying on this cost calculator functionality, potentially enabling attackers to compromise user sessions or perform phishing attacks via injected scripts.

Potential Impact

For European organizations, especially those operating e-commerce, service booking, or any online platforms utilizing the Cost Calculator for Elementor plugin, this vulnerability could lead to significant security risks. Exploitation can result in theft of user credentials, session hijacking, or unauthorized actions performed on behalf of users, undermining customer trust and potentially violating GDPR requirements concerning personal data protection. The medium severity and requirement for some privileges and user interaction mean that internal users or authenticated customers could be targeted to escalate attacks. Additionally, compromised websites could be used as vectors for broader attacks or to distribute malware, impacting brand reputation and causing operational disruptions. Organizations in sectors such as retail, travel, and professional services that rely on interactive cost calculators are particularly vulnerable. The lack of a patch at the time of publication increases the urgency for mitigation to prevent exploitation.

Mitigation Recommendations

European organizations should immediately audit their WordPress environments to identify installations of the Cost Calculator for Elementor plugin, particularly versions up to 1.3.3. Until an official patch is released, it is advisable to disable or remove the plugin if feasible, especially on high-risk or customer-facing sites. Implementing Web Application Firewall (WAF) rules that detect and block suspicious DOM-based XSS payloads targeting the plugin’s input vectors can provide interim protection. Organizations should also enforce strict Content Security Policy (CSP) headers to restrict script execution sources, limiting the impact of injected scripts. Regularly monitoring web server logs and user activity for anomalous behavior indicative of XSS exploitation attempts is recommended. Additionally, educating authenticated users about the risks of interacting with suspicious links or inputs can reduce the likelihood of successful exploitation. Once a patch is available, prompt application and testing in staging environments before production deployment are critical. Finally, maintaining up-to-date backups and incident response plans will help mitigate potential damage from exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-05-07T09:38:59.114Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981ac4522896dcbd94e9

Added to database: 5/21/2025, 9:08:42 AM

Last enriched: 7/5/2025, 12:26:32 PM

Last updated: 8/16/2025, 11:35:55 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats