Description
The Element Pack Addons for Elementor – Free Templates and Widgets for Your WordPress Websites plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Wrapper Link, Countdown and Gallery widgets in all versions up to, and including, 5.10.28 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: 2025-04-19
Score: 6.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting
Action: Apply Patch
AI Analysis

Impact

The Element Pack plugin for Elementor is vulnerable to stored cross‑site scripting through its Wrapper Link, Countdown, and Gallery widgets. Attackers with Contributor or higher permissions can inject arbitrary JavaScript into these widgets, which is then served to any user who views the affected page. This flaw permits attackers to execute code in the victim’s browser, potentially allowing data theft, session hijacking, or defacement.

Affected Systems

The flaw exists in all releases of the Element Pack – Widgets, Templates & Addons for Elementor plugin up to version 5.10.28. WordPress sites running any of these versions, including the Lite edition, are susceptible as long as users with Contributor‑level access can configure the vulnerable widgets.

Risk and Exploitability

The CVSS score of 6.4 indicates a moderate severity. The EPSS score of less than 1 % suggests that public exploitation is presently uncommon, and the vulnerability is not listed in the CISA KEV catalog. However, because it requires authenticated Contributor‑level access, an attacker must first compromise or legitimately access a WordPress site and then inject malicious content via the vulnerable widgets.

Generated by OpenCVE AI on April 20, 2026 at 23:13 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Element Pack plugin to a version later than 5.10.28 where the XSS bug has been fixed
  • If an immediate upgrade is not possible, restrict Contributor‑level users or disable the vulnerable Wrapper Link, Countdown, and Gallery widgets until the patch is applied
  • As a temporary safeguard, review the widget settings to ensure no executable scripts are permitted and consider restricting widget usage to trusted administrators only

Generated by OpenCVE AI on April 20, 2026 at 23:13 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-15121 The Element Pack Addons for Elementor – Free Templates and Widgets for Your WordPress Websites plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Wrapper Link, Countdown and Gallery widgets in all versions up to, and including, 5.10.28 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
History

Mon, 21 Apr 2025 03:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sat, 19 Apr 2025 03:45:00 +0000

Type Values Removed Values Added
Description The Element Pack Addons for Elementor – Free Templates and Widgets for Your WordPress Websites plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Wrapper Link, Countdown and Gallery widgets in all versions up to, and including, 5.10.28 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Title Element Pack Elementor Addons (Header Footer, Template Library, Dynamic Grid, Carousel and Remote Arrows) <= 5.10.28 - Authenticated (Contributor+) DOM-Based Stored Cross-Site Scripting
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:21:15.209Z

Reserved: 2025-02-18T20:04:08.408Z

Link: CVE-2025-1457

cve-icon Vulnrichment

Updated: 2025-04-21T02:41:43.070Z

cve-icon NVD

Status : Deferred

Published: 2025-04-19T04:15:22.357

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-1457

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-20T23:15:06Z

Weaknesses