Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67951: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in WPZOOM WPZOOM Addons for Elementor

0
Medium
VulnerabilityCVE-2025-67951cvecve-2025-67951
Published: Tue Dec 16 2025 (12/16/2025, 08:12:57 UTC)
Source: CVE Database V5
Vendor/Project: WPZOOM
Product: WPZOOM Addons for Elementor

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WPZOOM WPZOOM Addons for Elementor wpzoom-elementor-addons allows DOM-Based XSS.This issue affects WPZOOM Addons for Elementor: from n/a through <= 1.2.10.

AI-Powered Analysis

AILast updated: 01/31/2026, 08:05:20 UTC

Technical Analysis

CVE-2025-67951 is a DOM-based Cross-site Scripting vulnerability affecting the WPZOOM Addons for Elementor WordPress plugin, specifically versions up to and including 1.2.10. The vulnerability stems from improper neutralization of user-supplied input during web page generation, which allows malicious actors to inject and execute arbitrary JavaScript code within the context of the victim’s browser. This type of XSS is particularly dangerous because it exploits client-side script execution, potentially bypassing some server-side protections. The attack vector is remote (network accessible), requires low privileges (authenticated user), and user interaction (e.g., clicking a crafted link or visiting a malicious page). The vulnerability’s CVSS 3.1 base score is 6.5, reflecting medium severity with impacts on confidentiality, integrity, and availability. The scope is changed (S:C), meaning the vulnerability can affect resources beyond the initially vulnerable component. Although no known exploits are currently reported in the wild, the widespread use of Elementor and WPZOOM Addons in WordPress sites makes this a relevant threat. The vulnerability could be leveraged to steal session tokens, perform actions on behalf of users, or deliver malware payloads. The lack of an official patch link suggests that remediation may require vendor updates or manual mitigations. The vulnerability was reserved and published in December 2025 by Patchstack, indicating recent discovery and disclosure.

Potential Impact

For European organizations, this vulnerability poses a risk to websites and web applications built on WordPress using the WPZOOM Addons for Elementor plugin. Successful exploitation can lead to theft of sensitive user information such as session cookies, enabling account takeover or privilege escalation. It can also facilitate unauthorized actions on affected sites, defacement, or distribution of malware to visitors, damaging reputation and trust. The medium severity score reflects moderate impact, but the changed scope means that attacks could affect multiple users or systems beyond the initial vulnerable component. Organizations in sectors with high reliance on web presence—such as e-commerce, finance, and government—may face operational disruptions or data breaches. Given the requirement for user interaction and low privilege, phishing or social engineering could be used to trigger exploitation. The absence of known exploits in the wild reduces immediate risk but does not eliminate it, especially as threat actors often develop exploits after public disclosure. The impact is heightened in environments where plugin updates are delayed or where security monitoring is insufficient.

Mitigation Recommendations

1. Monitor WPZOOM and Elementor official channels for security patches addressing CVE-2025-67951 and apply updates promptly once available. 2. Until patches are released, implement strict Content Security Policies (CSP) to restrict execution of unauthorized scripts in browsers. 3. Employ web application firewalls (WAFs) with rules targeting XSS payloads specific to this plugin’s behavior. 4. Conduct thorough input validation and sanitization on all user-supplied data, especially in custom code or integrations involving the plugin. 5. Educate users and administrators about phishing risks and the importance of cautious interaction with links or content that could trigger XSS. 6. Regularly audit WordPress plugins and remove or replace those no longer maintained or with known vulnerabilities. 7. Enable multi-factor authentication (MFA) for administrative accounts to reduce impact of session hijacking. 8. Monitor logs and user activity for anomalies that might indicate exploitation attempts. 9. Consider isolating critical WordPress instances or using containerization to limit potential lateral movement. 10. Backup website data and configurations regularly to enable rapid recovery if compromise occurs.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-12-15T10:00:16.552Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69411753594e45819d70ccc7

Added to database: 12/16/2025, 8:24:51 AM

Last enriched: 1/31/2026, 8:05:20 AM

Last updated: 2/7/2026, 11:05:45 AM

Views: 54

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats