CVE-2025-6550: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in webangon The Pack Elementor addon
The The Pack Elementor addon plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘slider_options’ parameter in all versions up to, and including, 2.1.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
AI Analysis
Technical Summary
CVE-2025-6550 is a stored Cross-Site Scripting (XSS) vulnerability identified in The Pack Elementor addon plugin for WordPress, versions up to and including 2.1.4. The vulnerability stems from improper neutralization of input during web page generation, specifically through the 'slider_options' parameter. This parameter lacks sufficient input sanitization and output escaping, enabling authenticated attackers with Contributor-level privileges or higher to inject arbitrary JavaScript code into pages. When other users access these pages, the malicious scripts execute in their browsers, potentially compromising session tokens, redirecting users, or performing unauthorized actions within the context of the affected site. The vulnerability is classified under CWE-79 and has a CVSS 3.1 base score of 6.4, reflecting medium severity. The attack vector is network-based, with low complexity, requiring privileges but no additional user interaction, and the impact affects confidentiality and integrity but not availability. No patches or known exploits are currently documented, but the vulnerability's presence in a widely used WordPress addon increases the risk profile. The flaw highlights the importance of rigorous input validation and output encoding in web application components, especially those handling dynamic content generation.
Potential Impact
The impact of CVE-2025-6550 is significant for organizations using WordPress sites with The Pack Elementor addon. Successful exploitation allows attackers with Contributor-level access to inject persistent malicious scripts, which execute in the browsers of any users visiting the infected pages. This can lead to session hijacking, theft of sensitive user data, unauthorized actions performed on behalf of users, and potential site defacement. The compromise of user credentials or administrative sessions could facilitate further attacks, including privilege escalation or data exfiltration. Since the vulnerability affects confidentiality and integrity but not availability, the primary risks involve data breaches and trust erosion. Organizations with high-traffic WordPress sites or those handling sensitive user information are particularly vulnerable. The requirement for authenticated access limits exploitation to insiders or compromised accounts, but this does not eliminate risk, especially in environments with multiple contributors or weak access controls.
Mitigation Recommendations
To mitigate CVE-2025-6550, organizations should first verify if they use The Pack Elementor addon plugin and identify the installed version. Immediate steps include updating the plugin to a patched version once available from the vendor. In the absence of an official patch, administrators should implement strict input validation on the 'slider_options' parameter, ensuring that any user-supplied data is sanitized to remove or encode potentially dangerous characters. Output encoding should be applied consistently when rendering this parameter on web pages to prevent script execution. Additionally, review and restrict Contributor-level user permissions to minimize the risk of malicious input. Employing Web Application Firewalls (WAFs) with custom rules to detect and block suspicious script injections targeting this parameter can provide a temporary defense. Regular security audits and monitoring for unusual activity related to page content changes or script injections are also recommended. Finally, educating content contributors about secure content practices can reduce inadvertent exploitation.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Netherlands, India, Brazil, Japan, Italy, Spain
CVE-2025-6550: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in webangon The Pack Elementor addon
Description
The The Pack Elementor addon plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘slider_options’ parameter in all versions up to, and including, 2.1.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-6550 is a stored Cross-Site Scripting (XSS) vulnerability identified in The Pack Elementor addon plugin for WordPress, versions up to and including 2.1.4. The vulnerability stems from improper neutralization of input during web page generation, specifically through the 'slider_options' parameter. This parameter lacks sufficient input sanitization and output escaping, enabling authenticated attackers with Contributor-level privileges or higher to inject arbitrary JavaScript code into pages. When other users access these pages, the malicious scripts execute in their browsers, potentially compromising session tokens, redirecting users, or performing unauthorized actions within the context of the affected site. The vulnerability is classified under CWE-79 and has a CVSS 3.1 base score of 6.4, reflecting medium severity. The attack vector is network-based, with low complexity, requiring privileges but no additional user interaction, and the impact affects confidentiality and integrity but not availability. No patches or known exploits are currently documented, but the vulnerability's presence in a widely used WordPress addon increases the risk profile. The flaw highlights the importance of rigorous input validation and output encoding in web application components, especially those handling dynamic content generation.
Potential Impact
The impact of CVE-2025-6550 is significant for organizations using WordPress sites with The Pack Elementor addon. Successful exploitation allows attackers with Contributor-level access to inject persistent malicious scripts, which execute in the browsers of any users visiting the infected pages. This can lead to session hijacking, theft of sensitive user data, unauthorized actions performed on behalf of users, and potential site defacement. The compromise of user credentials or administrative sessions could facilitate further attacks, including privilege escalation or data exfiltration. Since the vulnerability affects confidentiality and integrity but not availability, the primary risks involve data breaches and trust erosion. Organizations with high-traffic WordPress sites or those handling sensitive user information are particularly vulnerable. The requirement for authenticated access limits exploitation to insiders or compromised accounts, but this does not eliminate risk, especially in environments with multiple contributors or weak access controls.
Mitigation Recommendations
To mitigate CVE-2025-6550, organizations should first verify if they use The Pack Elementor addon plugin and identify the installed version. Immediate steps include updating the plugin to a patched version once available from the vendor. In the absence of an official patch, administrators should implement strict input validation on the 'slider_options' parameter, ensuring that any user-supplied data is sanitized to remove or encode potentially dangerous characters. Output encoding should be applied consistently when rendering this parameter on web pages to prevent script execution. Additionally, review and restrict Contributor-level user permissions to minimize the risk of malicious input. Employing Web Application Firewalls (WAFs) with custom rules to detect and block suspicious script injections targeting this parameter can provide a temporary defense. Regular security audits and monitoring for unusual activity related to page content changes or script injections are also recommended. Finally, educating content contributors about secure content practices can reduce inadvertent exploitation.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-06-23T20:02:33.314Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 685e499eca1063fb87560139
Added to database: 6/27/2025, 7:34:54 AM
Last enriched: 2/26/2026, 3:39:56 PM
Last updated: 3/26/2026, 10:28:30 AM
Views: 125
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.