Description
The ThemeREX Addons plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 2.35.1.1 due to insufficient input sanitization and output escaping. The plugin’s SVG rendering routine calls the trx_addons_get_svg_from_file() function on an unvalidated 'svg' parameter supplied via the shortcode or Elementor widget settings, then outputs it via the trx_addons_show_layout() function. Because there is no check on the URL’s origin, scheme, or the SVG content itself, authenticated attackers, with Contributor-level access and above, can supply a remote SVG and inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file.
Published: 2025-07-19
Score: 6.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored cross‑site scripting that allows authenticated contributors to inject arbitrary JavaScript into pages rendered by the ThemeREX Addons plugin
Action: Patch Now
AI Analysis

Impact

The vulnerability resides in the ThemeREX Addons plugin’s SVG rendering routine, where the trx_addons_get_svg_from_file() function accepts an unvalidated 'svg' parameter from shortcode or Elementor widget settings and outputs it through trx_addons_show_layout() without sanitizing the URL or its contents. Because no origin or scheme checks are performed, a contributor or higher user can supply a remote SVG containing malicious scripts. When a user views the affected page, the included JavaScript executes in that user’s browser, potentially allowing an attacker to steal session cookies, deface content, or perform other client‑side attacks. The primary impact is arbitrary JavaScript execution in the context of the visiting user, which can lead to loss of confidentiality, integrity, and availability of the site’s content.

Affected Systems

WordPress sites that have installed the ThemeREX Addons plugin with a version of 2.35.1.1 or earlier. The affected product is the ThemeREX Addons plugin distributed by ThemeREX for WordPress. No specific WordPress core version is required for the flaw to exist; any site that uses the vulnerable plugin version is at risk.

Risk and Exploitability

The flaw has a CVSS score of 6.4, indicating a medium severity vulnerability. The EPSS score is reported as < 1%, suggesting low current exploitation probability. The vulnerability is not listed in the CISA KEV catalog. Attackers must first be authenticated with the Contributor role or higher, and then independently supply a crafted SVG file via the shortcode or Elementor widget. Once executed, the malicious script runs in the context of any user who views the page, creating a convenience vulnerability that does not require privilege escalation beyond a legitimate Contributor level. The risk is elevated for sites that grant Contributor access to many users, or that have a large and diverse user base that includes guests who will view the injected content. Overall, while exploitation likelihood is currently low, the impact warrants prompt mitigation.

Generated by OpenCVE AI on April 20, 2026 at 20:13 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade ThemeREX Addons to the latest released version that resolves the SVG sanitization issue. If an upgrade is not immediately feasible, remove or downgrade the Contributor role for users who do not need it to reduce the attack surface.
  • Disable or remove the shortcode/widget that permits external SVG URLs, either by configuring the plugin settings to reject remote URLs or by using a security plugin that blocks remote file inclusion.
  • Ensure that WordPress’s file‑upload permissions are tightly scoped so that only administrators can embed remote SVG files, and consider using an additional input‑validation plugin that sanitizes SVG content before rendering.

Generated by OpenCVE AI on April 20, 2026 at 20:13 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-21954 The ThemeREX Addons plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 2.35.1.1 due to insufficient input sanitization and output escaping. The plugin’s SVG rendering routine calls the trx_addons_get_svg_from_file() function on an unvalidated 'svg' parameter supplied via the shortcode or Elementor widget settings, then outputs it via the trx_addons_show_layout() function. Because there is no check on the URL’s origin, scheme, or the SVG content itself, authenticated attackers, with Contributor-level access and above, can supply a remote SVG and inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file.
History

Mon, 11 Aug 2025 19:15:00 +0000

Type Values Removed Values Added
First Time appeared Themerex
Themerex addons
CPEs cpe:2.3:a:themerex:addons:*:*:*:*:*:wordpress:*:*
Vendors & Products Themerex
Themerex addons

Mon, 21 Jul 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sat, 19 Jul 2025 08:45:00 +0000

Type Values Removed Values Added
Description The ThemeREX Addons plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 2.35.1.1 due to insufficient input sanitization and output escaping. The plugin’s SVG rendering routine calls the trx_addons_get_svg_from_file() function on an unvalidated 'svg' parameter supplied via the shortcode or Elementor widget settings, then outputs it via the trx_addons_show_layout() function. Because there is no check on the URL’s origin, scheme, or the SVG content itself, authenticated attackers, with Contributor-level access and above, can supply a remote SVG and inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file.
Title ThemeREX Addons <= 2.35.1.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via trx_addons_get_svg_from_file Function
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:28:59.504Z

Reserved: 2025-07-01T22:08:38.522Z

Link: CVE-2025-6997

cve-icon Vulnrichment

Updated: 2025-07-21T17:58:20.228Z

cve-icon NVD

Status : Analyzed

Published: 2025-07-19T09:15:23.477

Modified: 2025-08-11T19:13:21.383

Link: CVE-2025-6997

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-20T20:15:06Z

Weaknesses