Skip to main content

CVE-2025-7644: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in bdthemes Pixel Gallery Addons for Elementor – Easy Grid, Creative Gallery, Drag and Drop Grid, Custom Grid Layout, Portfolio Gallery

Medium
VulnerabilityCVE-2025-7644cvecve-2025-7644cwe-79
Published: Tue Jul 22 2025 (07/22/2025, 04:25:07 UTC)
Source: CVE Database V5
Vendor/Project: bdthemes
Product: Pixel Gallery Addons for Elementor – Easy Grid, Creative Gallery, Drag and Drop Grid, Custom Grid Layout, Portfolio Gallery

Description

The Pixel Gallery Addons for Elementor – Easy Grid, Creative Gallery, Drag and Drop Grid, Custom Grid Layout, Portfolio Gallery plugin for WordPress is vulnerable to Stored Cross-Site Scripting via URLs in all widgets in all versions up to, and including, 1.6.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

AI-Powered Analysis

AILast updated: 07/22/2025, 04:46:21 UTC

Technical Analysis

CVE-2025-7644 is a stored Cross-Site Scripting (XSS) vulnerability affecting the Pixel Gallery Addons for Elementor WordPress plugin, specifically its Easy Grid, Creative Gallery, Drag and Drop Grid, Custom Grid Layout, and Portfolio Gallery widgets. This vulnerability arises from improper neutralization of input during web page generation (CWE-79), where URLs are not sufficiently sanitized or escaped before being rendered. As a result, authenticated users with Contributor-level privileges or higher can inject arbitrary JavaScript code into pages via these widgets. When other users visit the compromised pages, the malicious scripts execute in their browsers, potentially leading to session hijacking, privilege escalation, or further compromise of the website and its users. The vulnerability affects all versions up to and including 1.6.7 of the plugin. The CVSS 3.1 base score is 6.4 (medium severity), reflecting network attack vector, low attack complexity, requiring privileges but no user interaction, and impacting confidentiality and integrity with a scope change. No known public exploits have been reported yet, but the vulnerability's presence in a widely used WordPress plugin makes it a significant risk, especially given the common use of Elementor and its addons in website development. The lack of available patches at the time of publication increases the urgency for mitigation.

Potential Impact

For European organizations, this vulnerability poses a considerable risk to websites using the affected Pixel Gallery Addons for Elementor plugin. Exploitation can lead to unauthorized script execution, enabling attackers to steal sensitive user data such as authentication cookies, perform actions on behalf of users, or inject malicious content that could damage brand reputation and trust. Organizations in sectors with high web presence—such as e-commerce, media, education, and government—are particularly vulnerable. The compromise of websites can also serve as a pivot point for further attacks within the organization's network or supply chain. Given the medium severity and the requirement for authenticated access, insider threats or compromised contributor accounts could be leveraged to exploit this vulnerability. Additionally, the cross-site scripting nature of the flaw can facilitate phishing or social engineering attacks targeting European users, potentially violating GDPR requirements related to data protection and breach notification.

Mitigation Recommendations

European organizations should immediately audit their WordPress installations to identify the presence of the affected Pixel Gallery Addons for Elementor plugin versions (up to 1.6.7). Until an official patch is released, organizations should consider the following specific mitigations: 1) Restrict Contributor-level and higher privileges to trusted users only, implementing strict access controls and monitoring for unusual activity. 2) Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious payloads targeting the vulnerable widgets, focusing on URL parameters and script injection patterns. 3) Implement Content Security Policy (CSP) headers to limit the execution of unauthorized scripts on affected web pages. 4) Conduct regular security scans and penetration tests focusing on stored XSS vectors within the plugin's widgets. 5) Educate content contributors about the risks of injecting untrusted content and enforce input validation policies. 6) Monitor web server and application logs for signs of exploitation attempts. Once a patch becomes available, prioritize prompt testing and deployment to eliminate the vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-07-14T15:22:33.545Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 687f140aa83201eaac181672

Added to database: 7/22/2025, 4:31:06 AM

Last enriched: 7/22/2025, 4:46:21 AM

Last updated: 7/22/2025, 4:46:21 AM

Views: 2

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats