Skip to main content

CVE-2025-58208: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in add-ons.org PDF for Elementor Forms + Drag And Drop Template Builder

Medium
VulnerabilityCVE-2025-58208cvecve-2025-58208cwe-79
Published: Wed Aug 27 2025 (08/27/2025, 17:45:46 UTC)
Source: CVE Database V5
Vendor/Project: add-ons.org
Product: PDF for Elementor Forms + Drag And Drop Template Builder

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in add-ons.org PDF for Elementor Forms + Drag And Drop Template Builder allows Stored XSS. This issue affects PDF for Elementor Forms + Drag And Drop Template Builder: from n/a through 6.2.0.

AI-Powered Analysis

AILast updated: 08/27/2025, 18:04:53 UTC

Technical Analysis

CVE-2025-58208 is a stored Cross-site Scripting (XSS) vulnerability classified under CWE-79, affecting the 'PDF for Elementor Forms + Drag And Drop Template Builder' plugin developed by add-ons.org. This vulnerability arises due to improper neutralization of input during web page generation, allowing malicious scripts to be injected and stored within the application. When a victim accesses the affected page or form, the malicious script executes in their browser context. The vulnerability affects all versions up to and including 6.2.0. The CVSS v3.1 base score is 6.5, indicating a medium severity level. The vector string (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L) reveals that the attack can be performed remotely over the network with low attack complexity, requires privileges (authenticated user), and user interaction (victim must open a crafted page). The scope is changed, meaning the vulnerability affects resources beyond the initially vulnerable component. The impact includes partial loss of confidentiality, integrity, and availability, as the attacker can execute arbitrary scripts in the context of other users, potentially stealing session tokens, modifying displayed content, or causing denial of service. No known exploits are currently reported in the wild, and no patches have been linked yet. This vulnerability is particularly relevant for websites using the Elementor Forms plugin with the PDF and Drag and Drop Template Builder add-on, which is popular for building interactive forms and generating PDFs within WordPress environments.

Potential Impact

For European organizations, this vulnerability poses significant risks especially to those relying on WordPress sites with the affected plugin for customer interactions, data collection, or document generation. Exploitation could lead to session hijacking, unauthorized actions performed on behalf of users, defacement, or distribution of malware via injected scripts. This can damage brand reputation, lead to data breaches involving personal data protected under GDPR, and cause operational disruptions. Sectors such as e-commerce, government portals, educational institutions, and healthcare providers using these plugins are at heightened risk. The cross-site scripting vulnerability could also facilitate phishing attacks by injecting deceptive content. Given the medium severity and requirement for authenticated access, insider threats or compromised user accounts could be leveraged to exploit this vulnerability, increasing the attack surface within organizations.

Mitigation Recommendations

Organizations should immediately audit their WordPress installations to identify the presence of the 'PDF for Elementor Forms + Drag And Drop Template Builder' plugin. Until an official patch is released, it is advisable to disable or remove the plugin if it is not critical. For critical use cases, implement strict input validation and output encoding on all user-supplied data within forms and templates. Employ Web Application Firewalls (WAFs) with custom rules to detect and block typical XSS payloads targeting this plugin. Enforce the principle of least privilege by limiting user roles that can submit or edit form content. Monitor logs for unusual activities such as unexpected script injections or form submissions. Educate users about the risks of interacting with untrusted links or content. Once a patch is available, prioritize prompt application. Additionally, consider Content Security Policy (CSP) headers to restrict script execution sources, mitigating the impact of potential XSS attacks.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-08-27T16:19:10.126Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68af44dead5a09ad0064ac49

Added to database: 8/27/2025, 5:48:14 PM

Last enriched: 8/27/2025, 6:04:53 PM

Last updated: 8/31/2025, 12:34:23 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats