CVE-2025-8199: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in debuggersstudio Marquee Addons for Elementor – Advanced Elements & Modern Motion Widgets
The MarqueeAddons plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Testimonial Marquee widget in all versions up to, and including, 2.4.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
AI Analysis
Technical Summary
CVE-2025-8199 is a stored cross-site scripting (XSS) vulnerability identified in the Marquee Addons for Elementor – Advanced Elements & Modern Motion Widgets WordPress plugin developed by debuggersstudio. The vulnerability arises from improper neutralization of input during web page generation (CWE-79), specifically within the Testimonial Marquee widget. All versions up to and including 2.4.3 are affected. The root cause is insufficient input sanitization and output escaping of user-supplied attributes, allowing authenticated users with contributor-level privileges or higher to inject arbitrary JavaScript code into pages. When other users access these compromised pages, the injected scripts execute in their browsers, potentially enabling session hijacking, privilege escalation, or unauthorized actions within the affected site context. The vulnerability has a CVSS 3.1 base score of 6.4, reflecting medium severity, with an attack vector of network (remote), low attack complexity, requiring privileges (PR:L), no user interaction, and a scope change. The impact affects confidentiality and integrity but not availability. No public exploits have been reported yet, but the vulnerability poses a risk to WordPress sites using this plugin, especially those with multiple contributors. The vulnerability was published on December 13, 2025, and no official patches or updates are currently linked, necessitating proactive mitigation steps.
Potential Impact
For European organizations, this vulnerability can lead to significant risks including unauthorized access to user sessions, data leakage, and potential defacement or manipulation of website content. Organizations relying on WordPress sites with the Marquee Addons plugin are at risk of attackers injecting malicious scripts that execute in the browsers of site visitors or administrators, potentially compromising sensitive information or enabling further attacks such as phishing or malware distribution. The requirement for contributor-level access means insider threats or compromised contributor accounts can be leveraged to exploit this vulnerability. The impact is particularly critical for organizations with public-facing websites that handle user data or provide interactive content, such as e-commerce, media, and government portals. The vulnerability does not affect availability directly but undermines trust and confidentiality, which can lead to reputational damage and regulatory compliance issues under GDPR if personal data is exposed.
Mitigation Recommendations
1. Monitor for and apply updates from debuggersstudio promptly once a patch addressing CVE-2025-8199 is released. 2. Until a patch is available, restrict contributor-level permissions to trusted users only and review existing contributor accounts for suspicious activity. 3. Implement a Web Application Firewall (WAF) with robust XSS filtering rules to detect and block malicious script injections targeting the affected widget. 4. Conduct regular security audits and code reviews of user-generated content, especially in testimonial or marquee widgets. 5. Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts on affected pages. 6. Educate content contributors about the risks of injecting untrusted code and enforce strict input validation policies. 7. Consider temporarily disabling or replacing the vulnerable widget if feasible until a secure version is available. 8. Monitor logs for unusual activity related to the plugin or contributor accounts to detect exploitation attempts early.
Affected Countries
Germany, United Kingdom, France, Italy, Spain, Netherlands, Poland
CVE-2025-8199: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in debuggersstudio Marquee Addons for Elementor – Advanced Elements & Modern Motion Widgets
Description
The MarqueeAddons plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Testimonial Marquee widget in all versions up to, and including, 2.4.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
AI-Powered Analysis
Technical Analysis
CVE-2025-8199 is a stored cross-site scripting (XSS) vulnerability identified in the Marquee Addons for Elementor – Advanced Elements & Modern Motion Widgets WordPress plugin developed by debuggersstudio. The vulnerability arises from improper neutralization of input during web page generation (CWE-79), specifically within the Testimonial Marquee widget. All versions up to and including 2.4.3 are affected. The root cause is insufficient input sanitization and output escaping of user-supplied attributes, allowing authenticated users with contributor-level privileges or higher to inject arbitrary JavaScript code into pages. When other users access these compromised pages, the injected scripts execute in their browsers, potentially enabling session hijacking, privilege escalation, or unauthorized actions within the affected site context. The vulnerability has a CVSS 3.1 base score of 6.4, reflecting medium severity, with an attack vector of network (remote), low attack complexity, requiring privileges (PR:L), no user interaction, and a scope change. The impact affects confidentiality and integrity but not availability. No public exploits have been reported yet, but the vulnerability poses a risk to WordPress sites using this plugin, especially those with multiple contributors. The vulnerability was published on December 13, 2025, and no official patches or updates are currently linked, necessitating proactive mitigation steps.
Potential Impact
For European organizations, this vulnerability can lead to significant risks including unauthorized access to user sessions, data leakage, and potential defacement or manipulation of website content. Organizations relying on WordPress sites with the Marquee Addons plugin are at risk of attackers injecting malicious scripts that execute in the browsers of site visitors or administrators, potentially compromising sensitive information or enabling further attacks such as phishing or malware distribution. The requirement for contributor-level access means insider threats or compromised contributor accounts can be leveraged to exploit this vulnerability. The impact is particularly critical for organizations with public-facing websites that handle user data or provide interactive content, such as e-commerce, media, and government portals. The vulnerability does not affect availability directly but undermines trust and confidentiality, which can lead to reputational damage and regulatory compliance issues under GDPR if personal data is exposed.
Mitigation Recommendations
1. Monitor for and apply updates from debuggersstudio promptly once a patch addressing CVE-2025-8199 is released. 2. Until a patch is available, restrict contributor-level permissions to trusted users only and review existing contributor accounts for suspicious activity. 3. Implement a Web Application Firewall (WAF) with robust XSS filtering rules to detect and block malicious script injections targeting the affected widget. 4. Conduct regular security audits and code reviews of user-generated content, especially in testimonial or marquee widgets. 5. Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts on affected pages. 6. Educate content contributors about the risks of injecting untrusted code and enforce strict input validation policies. 7. Consider temporarily disabling or replacing the vulnerable widget if feasible until a secure version is available. 8. Monitor logs for unusual activity related to the plugin or contributor accounts to detect exploitation attempts early.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-07-25T16:46:50.969Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 693d2749f35c2264d84723a0
Added to database: 12/13/2025, 8:43:53 AM
Last enriched: 12/20/2025, 9:11:03 AM
Last updated: 2/6/2026, 1:56:18 AM
Views: 73
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1972: Use of Default Credentials in Edimax BR-6208AC
MediumCVE-2026-1971: Cross Site Scripting in Edimax BR-6288ACL
MediumCVE-2026-23623: CWE-285: Improper Authorization in CollaboraOnline online
MediumCVE-2025-32393: CWE-770: Allocation of Resources Without Limits or Throttling in Significant-Gravitas AutoGPT
HighCVE-2026-24302: CWE-284: Improper Access Control in Microsoft Azure ARC
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.