CVE-2025-8779: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in shamsbd71 All-in-One Addons for Elementor – WidgetKit
The All-in-One Addons for Elementor – WidgetKit plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Team and Countdown widgets in all versions up to, and including, 2.5.6 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
AI Analysis
Technical Summary
CVE-2025-8779 is a stored cross-site scripting vulnerability identified in the All-in-One Addons for Elementor – WidgetKit plugin for WordPress, maintained by the vendor shamsbd71. This vulnerability affects all plugin versions up to and including 2.5.6. The root cause is improper neutralization of user-supplied input during web page generation, specifically within the Team and Countdown widgets. Authenticated attackers with contributor-level permissions or higher can inject arbitrary JavaScript code into pages by exploiting insufficient input sanitization and lack of output escaping. Once injected, the malicious scripts execute in the context of any user who visits the compromised page, potentially allowing attackers to steal session cookies, perform actions on behalf of users, or redirect users to malicious sites. The vulnerability has a CVSS 3.1 base score of 6.4, indicating medium severity, with an attack vector of network, low attack complexity, requiring privileges but no user interaction, and impacting confidentiality and integrity with a scope change. No public exploits are known at this time, but the vulnerability's presence in a widely used WordPress plugin makes it a significant risk. The vulnerability was reserved in August 2025 and published in December 2025. The lack of available patches at the time of publication necessitates immediate mitigation steps by administrators.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to websites using the affected WordPress plugin, especially those with multiple contributors or editors who have contributor-level access or above. Successful exploitation can lead to session hijacking, unauthorized actions performed under the guise of legitimate users, defacement, or distribution of malware through compromised pages. This can result in reputational damage, data breaches involving user credentials or personal information, and potential regulatory non-compliance under GDPR if personal data is exposed or manipulated. The medium severity score reflects that while the vulnerability does not directly impact availability, the confidentiality and integrity of web sessions and data are at risk. Organizations with public-facing websites relying on this plugin may experience customer trust erosion and increased incident response costs. Given the widespread use of WordPress in Europe, the threat surface is considerable, particularly for sectors such as e-commerce, media, and government services that rely heavily on content management systems.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the presence of the All-in-One Addons for Elementor – WidgetKit plugin and verify the version in use. Until an official patch is released, restrict contributor-level and higher privileges to trusted users only, minimizing the risk of malicious script injection. Implement Web Application Firewalls (WAFs) with custom rules to detect and block suspicious payloads targeting the Team and Countdown widgets. Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts on affected pages. Regularly monitor website content for unauthorized changes or injected scripts. Encourage developers and administrators to apply strict input validation and output encoding in custom code and plugins. Once a patch becomes available, prioritize its deployment in all affected environments. Additionally, conduct security awareness training for content contributors to recognize and avoid unsafe input practices. Finally, maintain comprehensive logging and monitoring to detect potential exploitation attempts promptly.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-8779: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in shamsbd71 All-in-One Addons for Elementor – WidgetKit
Description
The All-in-One Addons for Elementor – WidgetKit plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Team and Countdown widgets in all versions up to, and including, 2.5.6 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
AI-Powered Analysis
Technical Analysis
CVE-2025-8779 is a stored cross-site scripting vulnerability identified in the All-in-One Addons for Elementor – WidgetKit plugin for WordPress, maintained by the vendor shamsbd71. This vulnerability affects all plugin versions up to and including 2.5.6. The root cause is improper neutralization of user-supplied input during web page generation, specifically within the Team and Countdown widgets. Authenticated attackers with contributor-level permissions or higher can inject arbitrary JavaScript code into pages by exploiting insufficient input sanitization and lack of output escaping. Once injected, the malicious scripts execute in the context of any user who visits the compromised page, potentially allowing attackers to steal session cookies, perform actions on behalf of users, or redirect users to malicious sites. The vulnerability has a CVSS 3.1 base score of 6.4, indicating medium severity, with an attack vector of network, low attack complexity, requiring privileges but no user interaction, and impacting confidentiality and integrity with a scope change. No public exploits are known at this time, but the vulnerability's presence in a widely used WordPress plugin makes it a significant risk. The vulnerability was reserved in August 2025 and published in December 2025. The lack of available patches at the time of publication necessitates immediate mitigation steps by administrators.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to websites using the affected WordPress plugin, especially those with multiple contributors or editors who have contributor-level access or above. Successful exploitation can lead to session hijacking, unauthorized actions performed under the guise of legitimate users, defacement, or distribution of malware through compromised pages. This can result in reputational damage, data breaches involving user credentials or personal information, and potential regulatory non-compliance under GDPR if personal data is exposed or manipulated. The medium severity score reflects that while the vulnerability does not directly impact availability, the confidentiality and integrity of web sessions and data are at risk. Organizations with public-facing websites relying on this plugin may experience customer trust erosion and increased incident response costs. Given the widespread use of WordPress in Europe, the threat surface is considerable, particularly for sectors such as e-commerce, media, and government services that rely heavily on content management systems.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the presence of the All-in-One Addons for Elementor – WidgetKit plugin and verify the version in use. Until an official patch is released, restrict contributor-level and higher privileges to trusted users only, minimizing the risk of malicious script injection. Implement Web Application Firewalls (WAFs) with custom rules to detect and block suspicious payloads targeting the Team and Countdown widgets. Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts on affected pages. Regularly monitor website content for unauthorized changes or injected scripts. Encourage developers and administrators to apply strict input validation and output encoding in custom code and plugins. Once a patch becomes available, prioritize its deployment in all affected environments. Additionally, conduct security awareness training for content contributors to recognize and avoid unsafe input practices. Finally, maintain comprehensive logging and monitoring to detect potential exploitation attempts promptly.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-08-08T21:26:44.605Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 693d169bdd056aa40b718091
Added to database: 12/13/2025, 7:32:43 AM
Last enriched: 12/20/2025, 9:11:36 AM
Last updated: 2/7/2026, 8:52:18 AM
Views: 90
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2079: Improper Authorization in yeqifu warehouse
MediumCVE-2026-1675: CWE-1188 Initialization of a Resource with an Insecure Default in brstefanovic Advanced Country Blocker
MediumCVE-2026-1643: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ariagle MP-Ukagaka
MediumCVE-2026-1634: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in alexdtn Subitem AL Slider
MediumCVE-2026-1613: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in mrlister1 Wonka Slide
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.