Description
The All-in-One Addons for Elementor – WidgetKit plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'button+modal' widget in all versions up to, and including, 2.5.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: 2025-07-02
Score: 6.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross-Site Scripting
Action: Apply Patch
AI Analysis

Impact

The WidgetKit plugin allows an authenticated contributor or higher to inject arbitrary scripts into the button+modal widget. The plugin fails to sanitize or escape user supplied attributes, meaning the stored payload will be rendered when any visitor opens a page containing that widget. This is a CWE-79 stored cross-site scripting flaw, enabling attackers to execute malicious code in the visitor's browser, potentially stealing session cookies, defacing the site, or phishing for credentials.

Affected Systems

Affected systems are WordPress installations using the All-In-One Addons for Elementor - WidgetKit plugin, specifically versions 2.5.4 and earlier. The issue arises in the button+modal widget across all roles that can edit content but does not affect the underlying WordPress core or other plugins.

Risk and Exploitability

The flaw carries a CVSS score of 6.4 and an EPSS of less than 1%, indicating low spontaneous exploitation likelihood, and it is not listed in the CISA KEV catalog. However, because the vector requires contributor-level access, sites with many contributors are at higher risk. An attacker with such permission can inject code that will run for all visitors, enabling credential theft or site defacement.

Generated by OpenCVE AI on April 22, 2026 at 01:10 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the All-In-One Addons for Elementor - WidgetKit plugin to version 2.5.5 or later, which removes the CWE-79 stored XSS vulnerability.
  • If an immediate upgrade is not possible, disable the button+modal widget for user roles at contributor level or lower, or remove contributor permissions for that plugin feature, to mitigate the CWE-79 risk.
  • Ensure that any custom button or modal content entered by contributors is properly sanitized and escaped, and consider implementing an additional content filter or reviewing user input handling to prevent CWE-79 exploitation.

Generated by OpenCVE AI on April 22, 2026 at 01:10 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-19694 The All-in-One Addons for Elementor – WidgetKit plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'button+modal' widget in all versions up to, and including, 2.5.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
History

Fri, 11 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00034}

epss

{'score': 0.00032}


Thu, 10 Jul 2025 15:45:00 +0000

Type Values Removed Values Added
First Time appeared Themesgrove
Themesgrove all-in-one Addons For Elementor
CPEs cpe:2.3:a:themesgrove:all-in-one_addons_for_elementor:*:*:*:*:*:wordpress:*:*
Vendors & Products Themesgrove
Themesgrove all-in-one Addons For Elementor

Wed, 02 Jul 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 02 Jul 2025 09:30:00 +0000

Type Values Removed Values Added
Description The All-in-One Addons for Elementor – WidgetKit plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'button+modal' widget in all versions up to, and including, 2.5.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Title All-in-One Addons for Elementor – WidgetKit <= 2.5.4 - Authenticated (Contributor+) Stored Cross-Site Scripting via button+modal Widget
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Themesgrove All-in-one Addons For Elementor
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:04:14.785Z

Reserved: 2025-03-14T21:21:22.902Z

Link: CVE-2025-2330

cve-icon Vulnrichment

Updated: 2025-07-02T13:06:43.906Z

cve-icon NVD

Status : Analyzed

Published: 2025-07-02T10:15:23.033

Modified: 2025-07-10T15:25:12.770

Link: CVE-2025-2330

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T01:15:07Z

Weaknesses