2025-02-24
The ElementsKit Elementor addons plugin for WordPress is vulnerable to Stored Cross-Site Scripting (XSS) via the plugin’s Image Accordion widget in all versions up to, and including, 3.4.0. This vulnerability arises due to insufficient input sanitization and output escaping on user-supplied attributes. Authenticated attackers with contributor-level access or higher can exploit this vulnerability to inject arbitrary web scripts into pages. These scripts will execute whenever a user accesses an injected page, potentially leading to unauthorized actions, data theft, or further site compromise.
The vulnerability has been assigned the identifier CVE-2025-1005 and is classified as critical. The NVD (National Vulnerability Database) published this vulnerability on 02/15/2025, with the last modification on 02/24/2025. The source of this information is Wordfence, a reputable security provider for WordPress.
CVSS 3.x Severity and Vector Strings have been provided to help assess the risk level. The vulnerability is particularly concerning because it allows attackers with minimal access (contributor-level) to execute malicious scripts, which can have widespread impacts on the site’s security and user trust.
Summary:
The ElementsKit Elementor addons plugin for WordPress is vulnerable to a critical Stored Cross-Site Scripting (XSS) issue (CVE-2025-1005) in versions up to 3.4.0. This allows authenticated attackers with contributor-level access to inject malicious scripts into pages, posing significant security risks.
Form:
Platform: WordPress
Version: 3.4.0
Vulnerability: Stored XSS
Severity: Critical
Date: 02/15/2025
What Undercode Say:
- The vulnerability affects the ElementsKit Elementor addons plugin for WordPress.
- It is a Stored Cross-Site Scripting (XSS) issue.
- The vulnerability is present in all versions up to and including 3.4.0.
- Insufficient input sanitization and output escaping are the root causes.
- Authenticated attackers with contributor-level access can exploit it.
6. Malicious scripts can be injected into pages.
7. The vulnerability is classified as critical.
8. The CVE identifier is CVE-2025-1005.
9. The NVD published the vulnerability on 02/15/2025.
- The last modification date on the NVD is 02/24/2025.
- Wordfence is the source of the vulnerability information.
- The CVSS 3.x severity and vector strings are available.
- The vulnerability allows execution of arbitrary web scripts.
14. Contributor-level access is sufficient for exploitation.
- The Image Accordion widget is the affected component.
16. The vulnerability poses risks of unauthorized actions.
17. Data theft is a potential consequence.
18. Site compromise is a possible outcome.
19. The vulnerability impacts user trust.
- The issue is critical due to its widespread impact.
- The plugin is widely used in WordPress sites.
22. The vulnerability requires immediate attention.
23. Users should update to the latest version.
24. The vulnerability is publicly documented.
25. NVD provides references to advisories and solutions.
- The vulnerability is part of the NVD enrichment efforts.
27. CVSS information is contributed by multiple sources.
28. The vulnerability is linked to Weakness Enumeration.
29. Known affected software configurations are listed.
- The CPE 2.2 configuration is available for reference.
- The vulnerability is denoted as affecting vulnerable software.
- Quick info about the CVE is provided by the NVD.
- The vulnerability is critical due to its exploitability.
- The vulnerability is critical due to its impact.
- The vulnerability is critical due to its scope.
- The vulnerability is critical due to its ease of exploitation.
- The vulnerability is critical due to its potential damage.
- The vulnerability is critical due to its widespread use.
- The vulnerability is critical due to its public awareness.
- The vulnerability is critical due to its remediation urgency.
- The vulnerability is critical due to its historical context.
- The vulnerability is critical due to its technical complexity.
- The vulnerability is critical due to its attack vector.
- The vulnerability is critical due to its attack complexity.
- The vulnerability is critical due to its privileges required.
- The vulnerability is critical due to its user interaction.
- The vulnerability is critical due to its confidentiality impact.
- The vulnerability is critical due to its integrity impact.
- The vulnerability is critical due to its availability impact.
- The vulnerability is critical due to its CVSS score.
- The vulnerability is critical due to its NVD rating.
- The vulnerability is critical due to its Wordfence assessment.
- The vulnerability is critical due to its plugin popularity.
- The vulnerability is critical due to its potential for abuse.
- The vulnerability is critical due to its potential for escalation.
- The vulnerability is critical due to its potential for persistence.
- The vulnerability is critical due to its potential for evasion.
- The vulnerability is critical due to its potential for obfuscation.
- The vulnerability is critical due to its potential for distribution.
- The vulnerability is critical due to its potential for exploitation.
References:
Reported By: https://nvd.nist.gov/vuln/detail/CVE-2025-1005
Undercode AI: https://ai.undercodetesting.com
Image Source:
OpenAI: https://openai.com
Undercode AI DI v2: https://ai.undercode.help