Description
The Magical Addons For Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Custom Attributes in all versions up to, and including, 1.3.8 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: 2025-07-29
Score: 6.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting
Action: Update Plugin
AI Analysis

Impact

The Magical Addons For Elementor plugin allows authenticated users with contributor-level or higher permissions to save arbitrary content in a Custom Attributes field. Because the plugin fails to properly sanitise or escape these inputs, the data is stored unchanged in the database and later rendered on pages that include the custom attributes. The resulting stored XSS flaw lets an attacker inject and persist malicious scripts, which execute in the browser of any visitor who loads a page containing the injected content. This can lead to theft of session cookies, defacement, or further compromise of the site, and is classified as CWE‑79.

Affected Systems

The vulnerability affects all installations of the Magical Addons For Elementor plugin published by Nalam that are running version 1.3.8 or earlier. The plugin is distributed through the WordPress plugin repository and is commonly used to build custom headers, footers, widgets, and template libraries within WordPress sites. Versions newer than 1.3.8 incorporate a fix, so sites that retain the affected release remain vulnerable.

Risk and Exploitability

With a CVSS score of 6.4 the flaw is considered moderate, yet its EPSS score of less than 1% indicates a low probability of real-world exploitation at present. The defect is not listed in the CISA KEV catalog, implying no known widespread attacks. Since the vector requires authenticated contributor-level access, the risk is confined to compromised or malicious contributor accounts. Nonetheless, because the payloads are persistent and can affect all users who view the affected pages, administrators should prioritize remediation.

Generated by OpenCVE AI on April 22, 2026 at 00:59 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Magical Addons For Elementor to any release newer than 1.3.8.
  • Limit contributor permissions to only those accounts that require edit capabilities; revoke access for unnecessary users.
  • Search the site database for injected JavaScript in the Custom Attributes field and remove any malicious entries; then reset compromised user accounts if needed.

Generated by OpenCVE AI on April 22, 2026 at 00:59 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-22983 The Magical Addons For Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Custom Attributes in all versions up to, and including, 1.3.8 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
History

Wed, 30 Jul 2025 11:15:00 +0000

Type Values Removed Values Added
First Time appeared Elementor
Elementor elementor
Wordpress
Wordpress wordpress
Vendors & Products Elementor
Elementor elementor
Wordpress
Wordpress wordpress

Tue, 29 Jul 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 29 Jul 2025 09:30:00 +0000

Type Values Removed Values Added
Description The Magical Addons For Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Custom Attributes in all versions up to, and including, 1.3.8 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Title Magical Addons For Elementor <= 1.3.8 - Authenticated (Contributor+) Stored Cross-Site Scripting via Custom Attributes
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Elementor Elementor
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:54:36.939Z

Reserved: 2025-07-25T15:41:17.750Z

Link: CVE-2025-8196

cve-icon Vulnrichment

Updated: 2025-07-29T13:45:13.882Z

cve-icon NVD

Status : Deferred

Published: 2025-07-29T10:15:30.040

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-8196

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T01:00:04Z

Weaknesses