Description
The ElementsKit Elementor addons plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Image Accordion widget in all versions up to, and including, 3.4.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: 2025-02-15
Score: 6.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting
Action: Patch
AI Analysis

Impact

The ElementsKit Elementor addons plugin for WordPress contains an input sanitization and output escaping flaw in the Image Accordion widget that allows authenticated users with contributor-level privileges to store JavaScript payloads. When a site visitor views a page containing the injected widget, the malicious script executes in their browser, giving the attacker the ability to steal session cookies, deface content, or perform other cross‑site scripting attacks. The vulnerability is identified as a stored cross‑site scripting issue (CWE‑79).

Affected Systems

All releases of the ElementsKit Elementor Addons plugin up to and including version 3.4.0 are affected. The plugin is distributed under the vendor roxnor and is used within WordPress installations that implement advanced Elementor widgets. The Image Accordion widget is the entry point for the injection; any deployed instance of the plugin prior to the 3.4.1 release remains vulnerable.

Risk and Exploitability

The recorded CVSS score is 6.4, indicating medium impact. The EPSS score is less than 1 %, implying a low frequency of exploitation observed so far, and the vulnerability is not yet listed in CISA's KEV catalog. The attack vector is web‑based; an attacker must be able to log into the WordPress admin area with contributor or higher role, create or edit an Image Accordion widget in a page, and then have a site visitor load that page for the payload to run. Because the attack relies on legitimate site access and does not require elevated privileges beyond contributor level, sites with many contributors are at higher risk.

Generated by OpenCVE AI on April 22, 2026 at 04:16 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the ElementsKit Elementor Addons plugin to the latest released version available from the vendor, ensuring any known security improvements are applied.
  • If an immediate update is not feasible, disable the Image Accordion widget or restrict contributor roles from adding or editing such widgets to prevent further exploitation.
  • Search stored content for malicious scripts within Image Accordion widgets and manually remove them before exposing the site to visitors.

Generated by OpenCVE AI on April 22, 2026 at 04:16 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-1963 The ElementsKit Elementor addons plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Image Accordion widget in all versions up to, and including, 3.4.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
History

Tue, 15 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00027}

epss

{'score': 0.0003}


Mon, 14 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.0006}

epss

{'score': 0.00027}


Mon, 24 Feb 2025 13:00:00 +0000

Type Values Removed Values Added
First Time appeared Wpmet
Wpmet elementskit Elementor Addons
CPEs cpe:2.3:a:wpmet:elementskit_elementor_addons:*:*:*:*:*:wordpress:*:*
Vendors & Products Wpmet
Wpmet elementskit Elementor Addons

Tue, 18 Feb 2025 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Sat, 15 Feb 2025 09:30:00 +0000

Type Values Removed Values Added
Description The ElementsKit Elementor addons plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Image Accordion widget in all versions up to, and including, 3.4.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Title ElementsKit Elementor addons <= 3.4.0 - Authenticated (Contributor+) Stored Cross-Site Scripting via Image Accordion Widget
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Wpmet Elementskit Elementor Addons
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:55:20.660Z

Reserved: 2025-02-03T20:25:00.534Z

Link: CVE-2025-1005

cve-icon Vulnrichment

Updated: 2025-02-18T21:19:54.336Z

cve-icon NVD

Status : Analyzed

Published: 2025-02-15T10:15:08.740

Modified: 2025-02-24T12:31:01.313

Link: CVE-2025-1005

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T04:30:05Z

Weaknesses