CVE-2025-67951: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in WPZOOM WPZOOM Addons for Elementor
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WPZOOM WPZOOM Addons for Elementor wpzoom-elementor-addons allows DOM-Based XSS.This issue affects WPZOOM Addons for Elementor: from n/a through <= 1.2.10.
AI Analysis
Technical Summary
CVE-2025-67951 is a DOM-based Cross-site Scripting (XSS) vulnerability identified in the WPZOOM Addons for Elementor plugin, a popular WordPress extension used to enhance Elementor page builder functionality. The vulnerability stems from improper neutralization of user-supplied input during the generation of web pages, allowing malicious scripts to be injected and executed within the victim's browser context. This type of XSS is particularly dangerous because it manipulates the Document Object Model (DOM) on the client side, bypassing some traditional server-side input validation mechanisms. The affected versions include all releases up to and including 1.2.10, with no patch currently publicly available. Exploitation typically requires an attacker to craft a malicious URL or web content that, when visited or interacted with by a user, executes arbitrary JavaScript code. This can lead to session hijacking, credential theft, defacement, or redirection to malicious sites. Although no known exploits are reported in the wild, the vulnerability is publicly disclosed and thus may attract attackers. The plugin is widely used in WordPress sites that utilize Elementor, which is popular among European businesses for website creation and management. The lack of a CVSS score necessitates an independent severity assessment based on impact and exploitability factors.
Potential Impact
For European organizations, the impact of this DOM-based XSS vulnerability can be significant. Successful exploitation can compromise user sessions, leading to unauthorized access to sensitive information such as personal data, authentication tokens, or administrative credentials. This threatens confidentiality and integrity of data handled by affected websites. Additionally, attackers could deface websites or redirect users to phishing or malware distribution sites, damaging organizational reputation and trust. Availability could be indirectly affected if the website is taken offline for remediation or due to denial-of-service caused by malicious scripts. Organizations in sectors with high reliance on web presence—such as e-commerce, media, education, and government—face heightened risks. The vulnerability also raises compliance concerns under GDPR, as data breaches involving personal data must be reported and can incur penalties. Since exploitation does not require authentication, any visitor to a compromised site could be targeted, broadening the attack surface.
Mitigation Recommendations
Immediate mitigation involves monitoring WPZOOM’s official channels for patches addressing this vulnerability and applying updates promptly once released. Until a patch is available, organizations should implement strict Content Security Policies (CSP) to restrict the execution of unauthorized scripts and reduce the risk of XSS exploitation. Input validation and sanitization should be enforced on all user-controllable inputs, especially those reflected in the DOM. Web Application Firewalls (WAFs) can be configured to detect and block common XSS attack patterns targeting this plugin. Security teams should audit websites using WPZOOM Addons for Elementor to identify and remediate any instances of vulnerable versions. User awareness campaigns can help reduce the risk of users clicking on suspicious links. Regular security testing, including automated scanning and manual penetration testing focused on DOM-based XSS, should be integrated into the development lifecycle. Finally, logging and monitoring should be enhanced to detect anomalous activities indicative of exploitation attempts.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-67951: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in WPZOOM WPZOOM Addons for Elementor
Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WPZOOM WPZOOM Addons for Elementor wpzoom-elementor-addons allows DOM-Based XSS.This issue affects WPZOOM Addons for Elementor: from n/a through <= 1.2.10.
AI-Powered Analysis
Technical Analysis
CVE-2025-67951 is a DOM-based Cross-site Scripting (XSS) vulnerability identified in the WPZOOM Addons for Elementor plugin, a popular WordPress extension used to enhance Elementor page builder functionality. The vulnerability stems from improper neutralization of user-supplied input during the generation of web pages, allowing malicious scripts to be injected and executed within the victim's browser context. This type of XSS is particularly dangerous because it manipulates the Document Object Model (DOM) on the client side, bypassing some traditional server-side input validation mechanisms. The affected versions include all releases up to and including 1.2.10, with no patch currently publicly available. Exploitation typically requires an attacker to craft a malicious URL or web content that, when visited or interacted with by a user, executes arbitrary JavaScript code. This can lead to session hijacking, credential theft, defacement, or redirection to malicious sites. Although no known exploits are reported in the wild, the vulnerability is publicly disclosed and thus may attract attackers. The plugin is widely used in WordPress sites that utilize Elementor, which is popular among European businesses for website creation and management. The lack of a CVSS score necessitates an independent severity assessment based on impact and exploitability factors.
Potential Impact
For European organizations, the impact of this DOM-based XSS vulnerability can be significant. Successful exploitation can compromise user sessions, leading to unauthorized access to sensitive information such as personal data, authentication tokens, or administrative credentials. This threatens confidentiality and integrity of data handled by affected websites. Additionally, attackers could deface websites or redirect users to phishing or malware distribution sites, damaging organizational reputation and trust. Availability could be indirectly affected if the website is taken offline for remediation or due to denial-of-service caused by malicious scripts. Organizations in sectors with high reliance on web presence—such as e-commerce, media, education, and government—face heightened risks. The vulnerability also raises compliance concerns under GDPR, as data breaches involving personal data must be reported and can incur penalties. Since exploitation does not require authentication, any visitor to a compromised site could be targeted, broadening the attack surface.
Mitigation Recommendations
Immediate mitigation involves monitoring WPZOOM’s official channels for patches addressing this vulnerability and applying updates promptly once released. Until a patch is available, organizations should implement strict Content Security Policies (CSP) to restrict the execution of unauthorized scripts and reduce the risk of XSS exploitation. Input validation and sanitization should be enforced on all user-controllable inputs, especially those reflected in the DOM. Web Application Firewalls (WAFs) can be configured to detect and block common XSS attack patterns targeting this plugin. Security teams should audit websites using WPZOOM Addons for Elementor to identify and remediate any instances of vulnerable versions. User awareness campaigns can help reduce the risk of users clicking on suspicious links. Regular security testing, including automated scanning and manual penetration testing focused on DOM-based XSS, should be integrated into the development lifecycle. Finally, logging and monitoring should be enhanced to detect anomalous activities indicative of exploitation attempts.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-12-15T10:00:16.552Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 69411753594e45819d70ccc7
Added to database: 12/16/2025, 8:24:51 AM
Last enriched: 12/16/2025, 8:46:33 AM
Last updated: 12/18/2025, 11:37:12 AM
Views: 14
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
113,000 Impacted by Data Breach at Virginia Mental Health Authority
MediumCVE-2025-14364: CWE-862 Missing Authorization in kraftplugins Demo Importer Plus
HighCVE-2025-13730: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in daggerhart OpenID Connect Generic Client
MediumCVE-2025-13641: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in smub Photo Gallery, Sliders, Proofing and Themes – NextGEN Gallery
HighCVE-2025-64997: CWE-280: Improper Handling of Insufficient Permissions or Privileges in Checkmk GmbH Checkmk
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.