CVE-2025-8146: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in qodeinteractive Qi Addons For Elementor
The Qi Addons For Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's TypeOut Text widget in all versions up to, and including, 1.9.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
AI Analysis
Technical Summary
CVE-2025-8146 is a stored Cross-Site Scripting (XSS) vulnerability affecting the Qi Addons For Elementor WordPress plugin, specifically via the TypeOut Text widget. This vulnerability arises from improper input sanitization and insufficient output escaping of user-supplied attributes. Authenticated attackers with contributor-level privileges or higher can exploit this flaw by injecting arbitrary JavaScript code into pages generated by the plugin. When other users visit these compromised pages, the malicious scripts execute in their browsers, potentially leading to session hijacking, privilege escalation, or unauthorized actions on behalf of the victim. The vulnerability affects all versions up to and including 1.9.2 of the plugin. The CVSS v3.1 base score is 6.4, indicating a medium severity level. The attack vector is network-based, requiring low attack complexity and privileges (contributor or above), but no user interaction is needed for the payload to execute once injected. The vulnerability impacts confidentiality and integrity but does not affect availability. No known exploits have been reported in the wild at the time of publication. The vulnerability is classified under CWE-79, which covers improper neutralization of input during web page generation leading to XSS.
Potential Impact
For European organizations using WordPress websites with the Qi Addons For Elementor plugin, this vulnerability poses a significant risk to website integrity and user trust. Exploitation could allow attackers to steal session cookies, deface websites, or perform unauthorized actions under the guise of legitimate users. This is particularly concerning for organizations handling sensitive user data or providing critical online services, as compromised sessions could lead to data breaches or unauthorized administrative changes. Since the attack requires contributor-level access, insider threats or compromised contributor accounts are primary risk vectors. The stored nature of the XSS means the malicious payload persists and can affect multiple users over time. For sectors such as e-commerce, government portals, and media outlets prevalent in Europe, this could result in reputational damage, regulatory non-compliance (e.g., GDPR violations due to data leakage), and financial losses.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the presence of the Qi Addons For Elementor plugin and verify the version in use. Upgrading to a patched version, once released by the vendor, is the most effective mitigation. Until a patch is available, organizations should restrict contributor-level access strictly to trusted users and implement additional monitoring of user-generated content for suspicious scripts. Employing Web Application Firewalls (WAFs) with custom rules to detect and block typical XSS payloads targeting the TypeOut Text widget can reduce risk. Additionally, applying Content Security Policy (CSP) headers to restrict script execution sources can mitigate impact. Regular security training for contributors to recognize and avoid unsafe content submissions is recommended. Finally, website administrators should monitor logs for unusual activity and consider scanning existing content for injected scripts to remediate any persistent malicious code.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-8146: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in qodeinteractive Qi Addons For Elementor
Description
The Qi Addons For Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's TypeOut Text widget in all versions up to, and including, 1.9.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
AI-Powered Analysis
Technical Analysis
CVE-2025-8146 is a stored Cross-Site Scripting (XSS) vulnerability affecting the Qi Addons For Elementor WordPress plugin, specifically via the TypeOut Text widget. This vulnerability arises from improper input sanitization and insufficient output escaping of user-supplied attributes. Authenticated attackers with contributor-level privileges or higher can exploit this flaw by injecting arbitrary JavaScript code into pages generated by the plugin. When other users visit these compromised pages, the malicious scripts execute in their browsers, potentially leading to session hijacking, privilege escalation, or unauthorized actions on behalf of the victim. The vulnerability affects all versions up to and including 1.9.2 of the plugin. The CVSS v3.1 base score is 6.4, indicating a medium severity level. The attack vector is network-based, requiring low attack complexity and privileges (contributor or above), but no user interaction is needed for the payload to execute once injected. The vulnerability impacts confidentiality and integrity but does not affect availability. No known exploits have been reported in the wild at the time of publication. The vulnerability is classified under CWE-79, which covers improper neutralization of input during web page generation leading to XSS.
Potential Impact
For European organizations using WordPress websites with the Qi Addons For Elementor plugin, this vulnerability poses a significant risk to website integrity and user trust. Exploitation could allow attackers to steal session cookies, deface websites, or perform unauthorized actions under the guise of legitimate users. This is particularly concerning for organizations handling sensitive user data or providing critical online services, as compromised sessions could lead to data breaches or unauthorized administrative changes. Since the attack requires contributor-level access, insider threats or compromised contributor accounts are primary risk vectors. The stored nature of the XSS means the malicious payload persists and can affect multiple users over time. For sectors such as e-commerce, government portals, and media outlets prevalent in Europe, this could result in reputational damage, regulatory non-compliance (e.g., GDPR violations due to data leakage), and financial losses.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the presence of the Qi Addons For Elementor plugin and verify the version in use. Upgrading to a patched version, once released by the vendor, is the most effective mitigation. Until a patch is available, organizations should restrict contributor-level access strictly to trusted users and implement additional monitoring of user-generated content for suspicious scripts. Employing Web Application Firewalls (WAFs) with custom rules to detect and block typical XSS payloads targeting the TypeOut Text widget can reduce risk. Additionally, applying Content Security Policy (CSP) headers to restrict script execution sources can mitigate impact. Regular security training for contributors to recognize and avoid unsafe content submissions is recommended. Finally, website administrators should monitor logs for unusual activity and consider scanning existing content for injected scripts to remediate any persistent malicious code.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-07-24T20:50:54.441Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 688d9873ad5a09ad00d12695
Added to database: 8/2/2025, 4:47:47 AM
Last enriched: 8/2/2025, 5:02:43 AM
Last updated: 8/2/2025, 10:52:55 AM
Views: 4
Related Threats
CVE-2025-7710: CWE-288 Authentication Bypass Using an Alternate Path or Channel in Brave Brave Conversion Engine (PRO)
CriticalCVE-2025-7500: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in oceanwp Ocean Social Sharing
MediumCVE-2025-8467: SQL Injection in code-projects Wazifa System
MediumCVE-2025-8488: CWE-862 Missing Authorization in brainstormforce Ultimate Addons for Elementor (Formerly Elementor Header & Footer Builder)
MediumCVE-2025-6722: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in bitslip6 BitFire Security – Firewall, WAF, Bot/Spam Blocker, Login Security
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.