Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67951: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in WPZOOM WPZOOM Addons for Elementor

0
Medium
VulnerabilityCVE-2025-67951cvecve-2025-67951
Published: Tue Dec 16 2025 (12/16/2025, 08:12:57 UTC)
Source: CVE Database V5
Vendor/Project: WPZOOM
Product: WPZOOM Addons for Elementor

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WPZOOM WPZOOM Addons for Elementor wpzoom-elementor-addons allows DOM-Based XSS.This issue affects WPZOOM Addons for Elementor: from n/a through <= 1.2.10.

AI-Powered Analysis

AILast updated: 12/16/2025, 08:46:33 UTC

Technical Analysis

CVE-2025-67951 is a DOM-based Cross-site Scripting (XSS) vulnerability identified in the WPZOOM Addons for Elementor plugin, a popular WordPress extension used to enhance Elementor page builder functionality. The vulnerability stems from improper neutralization of user-supplied input during the generation of web pages, allowing malicious scripts to be injected and executed within the victim's browser context. This type of XSS is particularly dangerous because it manipulates the Document Object Model (DOM) on the client side, bypassing some traditional server-side input validation mechanisms. The affected versions include all releases up to and including 1.2.10, with no patch currently publicly available. Exploitation typically requires an attacker to craft a malicious URL or web content that, when visited or interacted with by a user, executes arbitrary JavaScript code. This can lead to session hijacking, credential theft, defacement, or redirection to malicious sites. Although no known exploits are reported in the wild, the vulnerability is publicly disclosed and thus may attract attackers. The plugin is widely used in WordPress sites that utilize Elementor, which is popular among European businesses for website creation and management. The lack of a CVSS score necessitates an independent severity assessment based on impact and exploitability factors.

Potential Impact

For European organizations, the impact of this DOM-based XSS vulnerability can be significant. Successful exploitation can compromise user sessions, leading to unauthorized access to sensitive information such as personal data, authentication tokens, or administrative credentials. This threatens confidentiality and integrity of data handled by affected websites. Additionally, attackers could deface websites or redirect users to phishing or malware distribution sites, damaging organizational reputation and trust. Availability could be indirectly affected if the website is taken offline for remediation or due to denial-of-service caused by malicious scripts. Organizations in sectors with high reliance on web presence—such as e-commerce, media, education, and government—face heightened risks. The vulnerability also raises compliance concerns under GDPR, as data breaches involving personal data must be reported and can incur penalties. Since exploitation does not require authentication, any visitor to a compromised site could be targeted, broadening the attack surface.

Mitigation Recommendations

Immediate mitigation involves monitoring WPZOOM’s official channels for patches addressing this vulnerability and applying updates promptly once released. Until a patch is available, organizations should implement strict Content Security Policies (CSP) to restrict the execution of unauthorized scripts and reduce the risk of XSS exploitation. Input validation and sanitization should be enforced on all user-controllable inputs, especially those reflected in the DOM. Web Application Firewalls (WAFs) can be configured to detect and block common XSS attack patterns targeting this plugin. Security teams should audit websites using WPZOOM Addons for Elementor to identify and remediate any instances of vulnerable versions. User awareness campaigns can help reduce the risk of users clicking on suspicious links. Regular security testing, including automated scanning and manual penetration testing focused on DOM-based XSS, should be integrated into the development lifecycle. Finally, logging and monitoring should be enhanced to detect anomalous activities indicative of exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-12-15T10:00:16.552Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69411753594e45819d70ccc7

Added to database: 12/16/2025, 8:24:51 AM

Last enriched: 12/16/2025, 8:46:33 AM

Last updated: 12/18/2025, 11:37:12 AM

Views: 14

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats