CVE-2025-47476: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in add-ons.org Cost Calculator for Elementor
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in add-ons.org Cost Calculator for Elementor allows DOM-Based XSS. This issue affects Cost Calculator for Elementor: from n/a through 1.3.3.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2025-47476 is a Cross-site Scripting (XSS) flaw categorized under CWE-79, specifically a DOM-Based XSS vulnerability found in the Cost Calculator for Elementor plugin developed by add-ons.org. This plugin is used within the Elementor page builder environment on WordPress sites to provide cost calculation functionalities. The vulnerability affects versions up to and including 1.3.3. DOM-Based XSS occurs when client-side scripts write untrusted data to the Document Object Model (DOM) without proper sanitization or encoding, allowing an attacker to inject malicious scripts that execute in the context of the victim's browser. In this case, improper neutralization of input during web page generation enables attackers to craft malicious payloads that, when processed by the plugin, lead to script execution. The CVSS v3.1 score of 6.5 (medium severity) reflects that the vulnerability requires network access, low attack complexity, privileges (PR:L) meaning some level of authenticated access, and user interaction (UI:R) to exploit. The impact scope is changed (S:C), indicating that exploitation can affect resources beyond the vulnerable component. The consequences include partial loss of confidentiality, integrity, and availability, as malicious scripts could steal sensitive data, manipulate page content, or disrupt service. No known exploits are currently reported in the wild, and no patches have been linked yet. Given the plugin’s integration with WordPress and Elementor, widely used in website development, this vulnerability poses a risk to websites relying on this cost calculator functionality, potentially enabling attackers to compromise user sessions or perform phishing attacks via injected scripts.
Potential Impact
For European organizations, especially those operating e-commerce, service booking, or any online platforms utilizing the Cost Calculator for Elementor plugin, this vulnerability could lead to significant security risks. Exploitation can result in theft of user credentials, session hijacking, or unauthorized actions performed on behalf of users, undermining customer trust and potentially violating GDPR requirements concerning personal data protection. The medium severity and requirement for some privileges and user interaction mean that internal users or authenticated customers could be targeted to escalate attacks. Additionally, compromised websites could be used as vectors for broader attacks or to distribute malware, impacting brand reputation and causing operational disruptions. Organizations in sectors such as retail, travel, and professional services that rely on interactive cost calculators are particularly vulnerable. The lack of a patch at the time of publication increases the urgency for mitigation to prevent exploitation.
Mitigation Recommendations
European organizations should immediately audit their WordPress environments to identify installations of the Cost Calculator for Elementor plugin, particularly versions up to 1.3.3. Until an official patch is released, it is advisable to disable or remove the plugin if feasible, especially on high-risk or customer-facing sites. Implementing Web Application Firewall (WAF) rules that detect and block suspicious DOM-based XSS payloads targeting the plugin’s input vectors can provide interim protection. Organizations should also enforce strict Content Security Policy (CSP) headers to restrict script execution sources, limiting the impact of injected scripts. Regularly monitoring web server logs and user activity for anomalous behavior indicative of XSS exploitation attempts is recommended. Additionally, educating authenticated users about the risks of interacting with suspicious links or inputs can reduce the likelihood of successful exploitation. Once a patch is available, prompt application and testing in staging environments before production deployment are critical. Finally, maintaining up-to-date backups and incident response plans will help mitigate potential damage from exploitation.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-47476: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in add-ons.org Cost Calculator for Elementor
Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in add-ons.org Cost Calculator for Elementor allows DOM-Based XSS. This issue affects Cost Calculator for Elementor: from n/a through 1.3.3.
AI-Powered Analysis
Technical Analysis
The vulnerability identified as CVE-2025-47476 is a Cross-site Scripting (XSS) flaw categorized under CWE-79, specifically a DOM-Based XSS vulnerability found in the Cost Calculator for Elementor plugin developed by add-ons.org. This plugin is used within the Elementor page builder environment on WordPress sites to provide cost calculation functionalities. The vulnerability affects versions up to and including 1.3.3. DOM-Based XSS occurs when client-side scripts write untrusted data to the Document Object Model (DOM) without proper sanitization or encoding, allowing an attacker to inject malicious scripts that execute in the context of the victim's browser. In this case, improper neutralization of input during web page generation enables attackers to craft malicious payloads that, when processed by the plugin, lead to script execution. The CVSS v3.1 score of 6.5 (medium severity) reflects that the vulnerability requires network access, low attack complexity, privileges (PR:L) meaning some level of authenticated access, and user interaction (UI:R) to exploit. The impact scope is changed (S:C), indicating that exploitation can affect resources beyond the vulnerable component. The consequences include partial loss of confidentiality, integrity, and availability, as malicious scripts could steal sensitive data, manipulate page content, or disrupt service. No known exploits are currently reported in the wild, and no patches have been linked yet. Given the plugin’s integration with WordPress and Elementor, widely used in website development, this vulnerability poses a risk to websites relying on this cost calculator functionality, potentially enabling attackers to compromise user sessions or perform phishing attacks via injected scripts.
Potential Impact
For European organizations, especially those operating e-commerce, service booking, or any online platforms utilizing the Cost Calculator for Elementor plugin, this vulnerability could lead to significant security risks. Exploitation can result in theft of user credentials, session hijacking, or unauthorized actions performed on behalf of users, undermining customer trust and potentially violating GDPR requirements concerning personal data protection. The medium severity and requirement for some privileges and user interaction mean that internal users or authenticated customers could be targeted to escalate attacks. Additionally, compromised websites could be used as vectors for broader attacks or to distribute malware, impacting brand reputation and causing operational disruptions. Organizations in sectors such as retail, travel, and professional services that rely on interactive cost calculators are particularly vulnerable. The lack of a patch at the time of publication increases the urgency for mitigation to prevent exploitation.
Mitigation Recommendations
European organizations should immediately audit their WordPress environments to identify installations of the Cost Calculator for Elementor plugin, particularly versions up to 1.3.3. Until an official patch is released, it is advisable to disable or remove the plugin if feasible, especially on high-risk or customer-facing sites. Implementing Web Application Firewall (WAF) rules that detect and block suspicious DOM-based XSS payloads targeting the plugin’s input vectors can provide interim protection. Organizations should also enforce strict Content Security Policy (CSP) headers to restrict script execution sources, limiting the impact of injected scripts. Regularly monitoring web server logs and user activity for anomalous behavior indicative of XSS exploitation attempts is recommended. Additionally, educating authenticated users about the risks of interacting with suspicious links or inputs can reduce the likelihood of successful exploitation. Once a patch is available, prompt application and testing in staging environments before production deployment are critical. Finally, maintaining up-to-date backups and incident response plans will help mitigate potential damage from exploitation.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-05-07T09:38:59.114Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d981ac4522896dcbd94e9
Added to database: 5/21/2025, 9:08:42 AM
Last enriched: 7/5/2025, 12:26:32 PM
Last updated: 8/16/2025, 11:35:55 AM
Views: 11
Related Threats
CVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9088: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9087: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-8878: CWE-94 Improper Control of Generation of Code ('Code Injection') in properfraction Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content – ProfilePress
MediumCVE-2025-8143: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in pencidesign Soledad
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.