Impact
The Magical Addons For Elementor plugin allows authenticated users with contributor-level or higher permissions to save arbitrary content in a Custom Attributes field. Because the plugin fails to properly sanitise or escape these inputs, the data is stored unchanged in the database and later rendered on pages that include the custom attributes. The resulting stored XSS flaw lets an attacker inject and persist malicious scripts, which execute in the browser of any visitor who loads a page containing the injected content. This can lead to theft of session cookies, defacement, or further compromise of the site, and is classified as CWE‑79.
Affected Systems
The vulnerability affects all installations of the Magical Addons For Elementor plugin published by Nalam that are running version 1.3.8 or earlier. The plugin is distributed through the WordPress plugin repository and is commonly used to build custom headers, footers, widgets, and template libraries within WordPress sites. Versions newer than 1.3.8 incorporate a fix, so sites that retain the affected release remain vulnerable.
Risk and Exploitability
With a CVSS score of 6.4 the flaw is considered moderate, yet its EPSS score of less than 1% indicates a low probability of real-world exploitation at present. The defect is not listed in the CISA KEV catalog, implying no known widespread attacks. Since the vector requires authenticated contributor-level access, the risk is confined to compromised or malicious contributor accounts. Nonetheless, because the payloads are persistent and can affect all users who view the affected pages, administrators should prioritize remediation.
OpenCVE Enrichment
EUVD