Skip to main content

CVE-2025-7046: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in dotrex Portfolio for Elementor & Image Gallery | PowerFolio

Medium
VulnerabilityCVE-2025-7046cvecve-2025-7046cwe-79
Published: Fri Jul 04 2025 (07/04/2025, 01:44:00 UTC)
Source: CVE Database V5
Vendor/Project: dotrex
Product: Portfolio for Elementor & Image Gallery | PowerFolio

Description

The Portfolio for Elementor & Image Gallery | PowerFolio plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Custom JS Attributes of Plugin's widgets in all versions up to, and including, 3.2.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. The issue was partially fixed in version 3.2.0 and fully fixed in version 3.2.1

AI-Powered Analysis

AILast updated: 07/14/2025, 21:19:15 UTC

Technical Analysis

CVE-2025-7046 is a stored Cross-Site Scripting (XSS) vulnerability affecting the WordPress plugin 'Portfolio for Elementor & Image Gallery | PowerFolio' developed by dotrex. This vulnerability arises from improper neutralization of input during web page generation, specifically within the Custom JS Attributes of the plugin's widgets. Versions up to and including 3.2.0 are vulnerable due to insufficient input sanitization and output escaping, allowing authenticated attackers with Contributor-level privileges or higher to inject arbitrary JavaScript code into pages. These malicious scripts execute whenever any user accesses the compromised page, potentially leading to session hijacking, defacement, or further exploitation of user browsers. The vulnerability was partially mitigated in version 3.2.0 and fully resolved in version 3.2.1. The CVSS v3.1 base score is 6.4 (medium severity), reflecting a network attack vector with low attack complexity, requiring privileges but no user interaction, and impacting confidentiality and integrity with a scope change. No known exploits are currently reported in the wild. The vulnerability is classified under CWE-79, indicating improper input neutralization leading to XSS.

Potential Impact

For European organizations using WordPress sites with the affected PowerFolio plugin, this vulnerability poses a significant risk. Attackers with Contributor-level access can inject malicious scripts that execute in the browsers of site visitors, potentially stealing session cookies, redirecting users to malicious sites, or performing unauthorized actions on behalf of users. This can lead to data breaches, reputational damage, and loss of user trust. Since Contributor-level access is required, the threat is more relevant in environments with multiple content editors or where account compromise is possible. The scope change in the CVSS vector indicates that the vulnerability can affect resources beyond the initially vulnerable component, potentially impacting other parts of the website or connected systems. Given the widespread use of WordPress in Europe for business and governmental websites, exploitation could disrupt services or leak sensitive data. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers often develop exploits after public disclosure.

Mitigation Recommendations

European organizations should immediately verify the version of the PowerFolio plugin installed on their WordPress sites and upgrade to version 3.2.1 or later, where the vulnerability is fully fixed. If upgrading is not immediately feasible, restrict Contributor-level access to trusted users only and monitor user activities closely. Implement Web Application Firewalls (WAFs) with rules to detect and block common XSS payloads targeting this plugin. Conduct regular security audits and scanning for malicious scripts injected into pages. Additionally, enforce Content Security Policy (CSP) headers to limit the execution of unauthorized scripts. Educate content editors about the risks of injecting untrusted JavaScript and enforce strict input validation policies. Finally, maintain up-to-date backups to enable quick restoration if compromise occurs.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-07-03T12:05:04.878Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68673b5e6f40f0eb729e5fde

Added to database: 7/4/2025, 2:24:30 AM

Last enriched: 7/14/2025, 9:19:15 PM

Last updated: 8/15/2025, 2:09:17 PM

Views: 26

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats