Description
The Elementor Website Builder – More Than Just a Page Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via several widget parameters in all versions up to, and including, 3.35.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: 2026-04-08
Score: 6.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting causing arbitrary script execution
Action: Patch
AI Analysis

Impact

The vulnerability is a stored cross‑site scripting flaw in Elementor Web­site Builder released up to version 3.35.5. By sending specially crafted widget parameters through the REST API, an authenticated user with Contributor or higher access can embed arbitrary JavaScript that is written to the page’s content. When other visitors load the affected page, the injected script runs in their browsers, allowing the attacker to steal session cookies, deface the site, or redirect users to malicious sites.

Affected Systems

All installations of the Elementor Web­site Builder plugin for WordPress with a version number of 3.35.5 or earlier are affected. The flaw exists in the widget parameter handling code and is present across the plugin’s API endpoints. Vendors or site owners using this plugin should verify that the version installed is 3.35.6 or later to remove the issue.

Risk and Exploitability

The severity rating is moderate, with a CVSS score of 6.4. Exploitation requires legitimate authentication with Contributor or higher role through the WordPress REST API; the attacker can then post malicious widget data. Since the vulnerability is not listed in CISA’s KEV catalog and no EPSS score is available, the likelihood of widespread exploitation remains uncertain, but the impact on any site that accepts contributor content is significant.

Generated by OpenCVE AI on April 8, 2026 at 02:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Elementor to version 3.35.6 or newer.
  • If an update cannot be applied immediately, restrict Contributor and higher roles to trusted users until the patch is installed.
  • Inspect existing pages for injected scripts and remove them manually.

Generated by OpenCVE AI on April 8, 2026 at 02:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 08 Apr 2026 19:45:00 +0000

Type Values Removed Values Added
First Time appeared Elemntor
Elemntor elementor Website Builder – More Than Just A Page Builder
Wordpress
Wordpress wordpress
Vendors & Products Elemntor
Elemntor elementor Website Builder – More Than Just A Page Builder
Wordpress
Wordpress wordpress

Wed, 08 Apr 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 08 Apr 2026 01:45:00 +0000

Type Values Removed Values Added
Description The Elementor Website Builder – More Than Just a Page Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via several widget parameters in all versions up to, and including, 3.35.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Title Elementor Website Builder <= 3.35.5 - Authenticated (Contributor+) Stored Cross-Site Scripting via REST API
Weaknesses CWE-87
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Elemntor Elementor Website Builder – More Than Just A Page Builder
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:41:11.729Z

Reserved: 2025-12-15T17:34:44.433Z

Link: CVE-2025-14732

cve-icon Vulnrichment

Updated: 2026-04-08T15:57:16.970Z

cve-icon NVD

Status : Deferred

Published: 2026-04-08T02:16:02.667

Modified: 2026-04-27T19:04:22.650

Link: CVE-2025-14732

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-08T19:44:13Z

Weaknesses