Description
The Amazing service box Addons For WPBakery Page Builder (formerly Visual Composer) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 2.0.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file.
Published: 2025-03-26
Score: 6.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting
Action: Patch
AI Analysis

Impact

The Amazing service box Addons For WPBakery Page Builder plugin is vulnerable due to insufficient input sanitization and output escaping during SVG file uploads. The flaw allows attackers with Author‑level or higher access to embed malicious scripts inside uploaded SVG files, which are served to any user who opens the file. This leads to a stored Cross‑Site Scripting (XSS) vulnerability (CWE‑79) that can compromise the confidentiality and integrity of users’ data and may be leveraged for session hijacking or other client‑side attacks.

Affected Systems

WordPress sites that have installed the Amazing service box Addons For WPBakery Page Builder plugin in any release up to and including version 2.0.0. The vulnerability applies regardless of theme or other plugins, as the flaw exists in the core upload handling of this plugin.

Risk and Exploitability

The CVSS score of 6.4 indicates a moderate risk, but the EPSS score of less than 1% suggests that exploitation is currently unlikely. Because the vulnerability requires authenticated access with Author or higher privileges, it is not a purely remote webcast exploit. The plugin is not listed in the CISA KEV catalog, so no public exploit is documented yet. Attackers would need to log into the WordPress admin interface, upload a crafted SVG file, and then entice a user to view the file to trigger the script.

Generated by OpenCVE AI on April 21, 2026 at 21:42 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the plugin to the latest released version (or await an official security patch).
  • If a patch is not yet available, prevent SVG uploads by removing the 'svg' mime type from WordPress’s allowed file types or using a security plugin to block SVG files.
  • Apply a Content Security Policy that blocks inline JavaScript execution to mitigate any remaining cross‑site scripting risk.

Generated by OpenCVE AI on April 21, 2026 at 21:42 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-8250 The Amazing service box Addons For WPBakery Page Builder (formerly Visual Composer) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 2.0.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file.
History

Wed, 26 Mar 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 26 Mar 2025 02:45:00 +0000

Type Values Removed Values Added
Description The Amazing service box Addons For WPBakery Page Builder (formerly Visual Composer) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 2.0.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file.
Title Amazing service box Addons For WPBakery Page Builder <= 2.0.0 - Authenticated (Author+) Stored Cross-Site Scripting via SVG File Upload
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:13:10.992Z

Reserved: 2025-03-20T20:28:26.924Z

Link: CVE-2025-2573

cve-icon Vulnrichment

Updated: 2025-03-26T18:45:36.938Z

cve-icon NVD

Status : Deferred

Published: 2025-03-26T03:15:13.033

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-2573

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T21:45:25Z

Weaknesses