Description
The Anber Elementor Addon plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the $item['button_link']['url'] parameter in all versions up to, and including, 1.0.1 to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: 2025-08-16
Score: 6.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting
Action: Patch Immediately
AI Analysis

Impact

The Anber Elementor Addon plugin for WordPress contains a stored cross‑site scripting flaw that allows an authenticated Contributor or higher to inject malicious scripts into the carousel button link. The injected payload or script is stored in the database and rendered on any page that displays the carousel, enabling an attacker to run arbitrary JavaScript in the browsers of all users who view the affected page.

Affected Systems

WordPress sites that have the Anber Elementor Addon installed and are running any version up to and including 1.0.1 are susceptible. Users with Contributor level or higher access can exploit the flaw through the plugin’s admin interface.

Risk and Exploitability

The CVSS score of 6.4 indicates moderate severity, while an EPSS score of less than 1% suggests a low likelihood of exploitation in the wild. The vulnerability is not listed in the CISA KEV catalog. Attackers need only legitimate contributor credentials and access to the plugin’s UI to store the malicious script, after which any visitor to the compromised page will execute the payload.

Generated by OpenCVE AI on April 21, 2026 at 03:32 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Anber Elementor Addon to the latest version (at least 1.0.2).
  • If an upgrade cannot be performed immediately, temporarily disable or remove the plugin to prevent further XSS injection.
  • Implement or enable a web application firewall rule that blocks or sanitizes malicious content in carousel button URLs, such as an OWASP ModSecurity XSS rule set.

Generated by OpenCVE AI on April 21, 2026 at 03:32 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-25066 The Anber Elementor Addon plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the $item['button_link']['url'] parameter in all versions up to, and including, 1.0.1 to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
History

Mon, 18 Aug 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sat, 16 Aug 2025 03:45:00 +0000

Type Values Removed Values Added
Description The Anber Elementor Addon plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the $item['button_link']['url'] parameter in all versions up to, and including, 1.0.1 to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Title Anber Elementor Addon <= 1.0.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via Carousel button link
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:58:17.804Z

Reserved: 2025-07-10T17:50:47.436Z

Link: CVE-2025-7440

cve-icon Vulnrichment

Updated: 2025-08-18T13:36:55.186Z

cve-icon NVD

Status : Deferred

Published: 2025-08-16T04:16:03.720

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-7440

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T03:45:27Z

Weaknesses