Skip to main content

CVE-2025-7646: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in posimyththemes The Plus Addons for Elementor – Elementor Addons, Page Templates, Widgets, Mega Menu, WooCommerce

Medium
VulnerabilityCVE-2025-7646cvecve-2025-7646cwe-79
Published: Fri Aug 01 2025 (08/01/2025, 06:44:31 UTC)
Source: CVE Database V5
Vendor/Project: posimyththemes
Product: The Plus Addons for Elementor – Elementor Addons, Page Templates, Widgets, Mega Menu, WooCommerce

Description

The The Plus Addons for Elementor – Elementor Addons, Page Templates, Widgets, Mega Menu, WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the custom script parameter in all versions up to, and including, 6.3.10 even when the user does not have the unfiltered_html capability. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

AI-Powered Analysis

AILast updated: 08/01/2025, 07:17:52 UTC

Technical Analysis

CVE-2025-7646 is a stored Cross-Site Scripting (XSS) vulnerability affecting The Plus Addons for Elementor plugin for WordPress, which includes Elementor Addons, Page Templates, Widgets, Mega Menu, and WooCommerce integrations. This vulnerability exists in all versions up to and including 6.3.10. The flaw arises from improper neutralization of input during web page generation, specifically via the 'custom script' parameter. An authenticated attacker with Contributor-level privileges or higher can inject arbitrary JavaScript code into pages. These malicious scripts are then stored and executed whenever any user accesses the compromised page. Notably, this vulnerability can be exploited even if the user does not have the 'unfiltered_html' capability, which normally restricts script injection. The vulnerability is classified under CWE-79, indicating improper input sanitization leading to XSS. The CVSS v3.1 base score is 6.4 (medium severity), with an attack vector of network (remote), low attack complexity, requiring privileges (low), no user interaction, and a scope change. The impact includes limited confidentiality and integrity loss but no availability impact. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability allows attackers to execute arbitrary scripts in the context of the affected site, potentially leading to session hijacking, defacement, or further attacks on users and administrators.

Potential Impact

For European organizations using WordPress sites with The Plus Addons for Elementor plugin, this vulnerability poses a significant risk. Since Contributor-level users can exploit it, attackers could leverage compromised or malicious user accounts to inject persistent malicious scripts. This can lead to theft of session cookies, user credentials, or other sensitive data, undermining confidentiality. Integrity of website content can be compromised through unauthorized script execution, potentially damaging brand reputation and trust. Although availability is not directly impacted, successful exploitation could facilitate further attacks such as phishing or malware distribution. E-commerce sites using WooCommerce integrations are particularly at risk of customer data exposure or fraudulent transactions. Given the widespread use of WordPress and Elementor in Europe, especially among SMEs and digital agencies, the threat surface is considerable. The vulnerability's ability to bypass typical capability restrictions increases the risk of exploitation by insiders or attackers who have gained limited access. This could also affect compliance with GDPR if personal data is exposed or manipulated.

Mitigation Recommendations

Organizations should immediately audit their WordPress installations to identify if The Plus Addons for Elementor plugin is in use and determine the version. Until an official patch is released, the following specific mitigations are recommended: 1) Restrict Contributor-level and higher user roles to trusted personnel only and review user accounts for suspicious activity. 2) Implement Web Application Firewall (WAF) rules to detect and block suspicious script injections targeting the 'custom script' parameter. 3) Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts on affected pages. 4) Regularly monitor website content for unauthorized script tags or injected code. 5) Disable or restrict the use of the vulnerable plugin if feasible, or replace it with alternative, secure plugins. 6) Educate content contributors about the risks of injecting scripts and enforce strict input validation policies. 7) Prepare to apply vendor patches promptly once available. 8) Conduct security scans and penetration tests focusing on XSS vectors related to this plugin. These targeted actions go beyond generic advice by focusing on user role management, WAF tuning, CSP implementation, and proactive monitoring specific to the vulnerability's exploitation vector.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-07-14T16:25:15.476Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 688c6695ad5a09ad00c68506

Added to database: 8/1/2025, 7:02:45 AM

Last enriched: 8/1/2025, 7:17:52 AM

Last updated: 8/1/2025, 10:21:49 PM

Views: 7

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats