Description
The ElementsKit Pro plugin for WordPress is vulnerable to DOM-Based Stored Cross-Site Scripting via the ‘url’ parameter in all versions up to, and including, 3.7.8 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: 2025-01-28
Score: 6.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored XSS allowing arbitrary script execution
Action: Apply Patch
AI Analysis

Impact

The ElementsKit Pro plugin is affected by a DOM‑Based Stored Cross‑Site Scripting flaw that originates from the unchecked ‘url’ parameter in all versions up to 3.7.8. The vulnerability follows CWE‑79, enabling an attacker who can authenticate with Contributor or higher level access to inject arbitrary web scripts. Those scripts are stored within the plugin’s pages and run automatically whenever any user visits the affected page, potentially compromising confidentiality, integrity, and availability of the site and its visitors.

Affected Systems

WordPress sites that have the ElementsKit Pro plugin from wpmet installed, including all releases up to version 3.7.8.

Risk and Exploitability

The CVSS score of 6.4 indicates a moderate severity, while the EPSS score of less than 1% suggests a low likelihood of exploitation. The attack is limited to authenticated users with Contributor or higher privileges, but once a script is injected it is executed for any subsequent user who views the page. The vulnerability is not listed in the CISA KEV catalog, so there is no current evidence of active exploitation in the wild.

Generated by OpenCVE AI on April 28, 2026 at 03:45 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update ElementsKit Pro to a version newer than 3.7.8.
  • If an update cannot be applied, deactivate or delete the plugin from the site.
  • Review and restrict WordPress user roles, removing Contributor or higher access from users who do not require it to reduce the attack surface.

Generated by OpenCVE AI on April 28, 2026 at 03:45 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-1602 The ElementsKit Pro plugin for WordPress is vulnerable to DOM-Based Stored Cross-Site Scripting via the ‘url’ parameter in all versions up to, and including, 3.7.8 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
History

Thu, 30 Jan 2025 18:00:00 +0000

Type Values Removed Values Added
First Time appeared Wpmet
Wpmet elementskit
CPEs cpe:2.3:a:wpmet:elementskit:*:*:*:*:pro:wordpress:*:*
Vendors & Products Wpmet
Wpmet elementskit

Tue, 28 Jan 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 28 Jan 2025 07:30:00 +0000

Type Values Removed Values Added
Description The ElementsKit Pro plugin for WordPress is vulnerable to DOM-Based Stored Cross-Site Scripting via the ‘url’ parameter in all versions up to, and including, 3.7.8 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Title ElementsKit Pro <= 3.7.8 - Authenticated (Contributor+) DOM-Based Stored Cross-Site Scripting via url Parameter
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Wpmet Elementskit
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:41:13.771Z

Reserved: 2025-01-07T23:58:53.076Z

Link: CVE-2025-0321

cve-icon Vulnrichment

Updated: 2025-01-28T14:46:34.390Z

cve-icon NVD

Status : Analyzed

Published: 2025-01-28T08:15:29.810

Modified: 2025-01-30T17:39:45.447

Link: CVE-2025-0321

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T04:00:05Z

Weaknesses