CVE-2025-7440: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in yeashir Anber Elementor Addon
The Anber Elementor Addon plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the $item['button_link']['url'] parameter in all versions up to, and including, 1.0.1 to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
AI Analysis
Technical Summary
CVE-2025-7440 is a stored Cross-Site Scripting (XSS) vulnerability identified in the yeashir Anber Elementor Addon plugin for WordPress, affecting all versions up to and including 1.0.1. The vulnerability arises due to improper neutralization of input during web page generation, specifically through insufficient sanitization and output escaping of the $item['button_link']['url'] parameter. This flaw allows an authenticated attacker with Contributor-level privileges or higher to inject arbitrary malicious scripts into pages generated by the plugin. When other users visit these compromised pages, the injected scripts execute in their browsers, potentially leading to session hijacking, privilege escalation, defacement, or distribution of malware. The vulnerability is classified under CWE-79, indicating a failure to properly sanitize input before rendering it in a web context. The CVSS v3.1 base score is 6.4 (medium severity), with an attack vector of network (remote exploitation), low attack complexity, requiring privileges (PR:L) but no user interaction, and impacting confidentiality and integrity with a scope change. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability affects a widely used WordPress plugin that integrates with Elementor, a popular page builder, increasing the potential attack surface for websites using this plugin.
Potential Impact
For European organizations, this vulnerability poses a significant risk especially to those relying on WordPress websites enhanced with the Anber Elementor Addon plugin. Exploitation could lead to unauthorized script execution in the context of the victim's browser, enabling attackers to steal session cookies, perform actions on behalf of users, or deliver further malware payloads. This can compromise user data confidentiality and website integrity, potentially damaging brand reputation and violating data protection regulations such as GDPR. Since the vulnerability requires authenticated access at Contributor level or higher, organizations with multiple content editors or contributors are at increased risk. The scope change in the CVSS vector indicates that the vulnerability could affect resources beyond the initially vulnerable component, amplifying the impact. Given the widespread use of WordPress across European businesses, including e-commerce, government, and media sectors, the threat could disrupt services and lead to data breaches if exploited.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Immediately audit their WordPress installations to identify the presence of the Anber Elementor Addon plugin and verify its version. 2) Restrict Contributor-level access strictly to trusted users and review user roles and permissions to minimize exposure. 3) Implement web application firewalls (WAFs) with rules to detect and block malicious payloads targeting the vulnerable parameter. 4) Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in browsers. 5) Monitor website logs for unusual activity indicative of attempted exploitation. 6) Since no official patch is currently available, consider temporarily disabling the plugin or removing the vulnerable functionality until a fix is released. 7) Educate content contributors about safe input practices and the risks of injecting untrusted content. 8) Plan for rapid deployment of patches once released by the vendor. These steps go beyond generic advice by focusing on access control, proactive detection, and containment strategies tailored to the vulnerability's characteristics.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-7440: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in yeashir Anber Elementor Addon
Description
The Anber Elementor Addon plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the $item['button_link']['url'] parameter in all versions up to, and including, 1.0.1 to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
AI-Powered Analysis
Technical Analysis
CVE-2025-7440 is a stored Cross-Site Scripting (XSS) vulnerability identified in the yeashir Anber Elementor Addon plugin for WordPress, affecting all versions up to and including 1.0.1. The vulnerability arises due to improper neutralization of input during web page generation, specifically through insufficient sanitization and output escaping of the $item['button_link']['url'] parameter. This flaw allows an authenticated attacker with Contributor-level privileges or higher to inject arbitrary malicious scripts into pages generated by the plugin. When other users visit these compromised pages, the injected scripts execute in their browsers, potentially leading to session hijacking, privilege escalation, defacement, or distribution of malware. The vulnerability is classified under CWE-79, indicating a failure to properly sanitize input before rendering it in a web context. The CVSS v3.1 base score is 6.4 (medium severity), with an attack vector of network (remote exploitation), low attack complexity, requiring privileges (PR:L) but no user interaction, and impacting confidentiality and integrity with a scope change. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability affects a widely used WordPress plugin that integrates with Elementor, a popular page builder, increasing the potential attack surface for websites using this plugin.
Potential Impact
For European organizations, this vulnerability poses a significant risk especially to those relying on WordPress websites enhanced with the Anber Elementor Addon plugin. Exploitation could lead to unauthorized script execution in the context of the victim's browser, enabling attackers to steal session cookies, perform actions on behalf of users, or deliver further malware payloads. This can compromise user data confidentiality and website integrity, potentially damaging brand reputation and violating data protection regulations such as GDPR. Since the vulnerability requires authenticated access at Contributor level or higher, organizations with multiple content editors or contributors are at increased risk. The scope change in the CVSS vector indicates that the vulnerability could affect resources beyond the initially vulnerable component, amplifying the impact. Given the widespread use of WordPress across European businesses, including e-commerce, government, and media sectors, the threat could disrupt services and lead to data breaches if exploited.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Immediately audit their WordPress installations to identify the presence of the Anber Elementor Addon plugin and verify its version. 2) Restrict Contributor-level access strictly to trusted users and review user roles and permissions to minimize exposure. 3) Implement web application firewalls (WAFs) with rules to detect and block malicious payloads targeting the vulnerable parameter. 4) Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in browsers. 5) Monitor website logs for unusual activity indicative of attempted exploitation. 6) Since no official patch is currently available, consider temporarily disabling the plugin or removing the vulnerable functionality until a fix is released. 7) Educate content contributors about safe input practices and the risks of injecting untrusted content. 8) Plan for rapid deployment of patches once released by the vendor. These steps go beyond generic advice by focusing on access control, proactive detection, and containment strategies tailored to the vulnerability's characteristics.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-07-10T17:50:47.436Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 689fff64ad5a09ad0074398f
Added to database: 8/16/2025, 3:47:48 AM
Last enriched: 8/24/2025, 1:01:10 AM
Last updated: 8/25/2025, 12:35:04 AM
Views: 17
Related Threats
CVE-2025-52184: n/a
UnknownCVE-2025-2697: CWE-601 URL Redirection to Untrusted Site ('Open Redirect') in IBM Cognos Command Center
HighCVE-2025-1994: CWE-242 Use of Inherently Dangerous Function in IBM Cognos Command Center
HighCVE-2025-1494: CWE-1021 Improper Restriction of Rendered UI Layers or Frames in IBM Cognos Command Center
MediumCVE-2025-50974: n/a
UnknownActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.