Impact
The vulnerability is a stored cross‑site scripting flaw in the Essential Addons for Elementor plugin, specifically within the Event Calendar widget and the Image Masking module. Insufficient input sanitization and output escaping allow an authenticated user with Contributor level or higher privileges to inject malicious JavaScript that will run in the browser of anyone who views the affected page. The entry states that injected scripts execute whenever a user accesses an injected page, indicating that the payload could exfiltrate credentials, deface content, or perform actions on behalf of the user.
Affected Systems
WordPress sites running the Essential Addons for Elementor – Popular Elementor Templates & Widgets plugin (vendor wpdevteam) are affected. All releases up to and including version 6.5.3 contain the flaw. Users who have installed these versions should verify their plugin version and update if necessary.
Risk and Exploitability
The CVSS score of 6.4 classifies the risk as moderate, and the EPSS score of less than 1% suggests a low probability of exploitation in the wild; however, because this flaw requires only Contributor‑level access, it is relatively easy to obtain within many sites. The vulnerability is not listed in CISA KEV, but should still be addressed promptly. Attackers would typically authenticate through the WordPress dashboard and insert malicious payloads via the Event Calendar or Image Masking editors. Successful exploitation would impact the confidentiality, integrity, and availability of the site to all authenticated and unauthenticated users who view the compromised content.
OpenCVE Enrichment