Description
The Enter Addons plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Countdown and Image Comparison widgets in all versions up to, and including, 2.2.7 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: 2025-12-13
Score: 6.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting that permits arbitrary script execution
Action: Upgrade
AI Analysis

Impact

The Enter Addons plugin is vulnerable to a stored cross‑site scripting flaw in its Countdown and Image Comparison widgets. Unsanitized user supplied attributes allow an authenticated contributor or higher to inject malicious scripts that are persisted in site content and executed whenever a page containing the widget is viewed by any visitor. The injected payload can run in the context of the site, enabling cookie theft, session hijacking, defacement, or other client‑side attacks.

Affected Systems

All installations of the Enter Addons – Ultimate Template Builder for Elementor plugin with versions 2.2.7 or earlier running on WordPress are affected. Any user with contributor‑level access or higher can trigger the vulnerability. Host environments are unrestricted beyond the plugin’s version and user role.

Risk and Exploitability

The base score of 6.4 indicates a moderate severity. The EPSS score of less than 1 % suggests low current exploitation probability, and the flaw is not yet listed in the CISA KEV catalog. Exploitation requires authentication, so the attacker must first obtain at least contributor privileges. Once authenticated, the attacker can embed a script via the widget’s attribute fields which is then stored and executed for all users who view the affected page. No network‑bypass or elevated privileges are needed beyond the role ensuring a lower barrier to entry for the attacker but the impact is confined to the site’s front‑end execution context.

Generated by OpenCVE AI on April 20, 2026 at 18:54 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Enter Addons to 2.2.8 or later
  • If unable to upgrade, revoke contributor-level permissions from users who can edit the widget and remove the Countdown and Image Comparison widgets from active pages
  • Review existing pages for injected scripts and clean them manually from the widget’s attributes

Generated by OpenCVE AI on April 20, 2026 at 18:54 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 15 Dec 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sun, 14 Dec 2025 21:30:00 +0000

Type Values Removed Values Added
First Time appeared Elementor
Elementor elementor
Themelooks
Themelooks enter Addons
Wordpress
Wordpress wordpress
Vendors & Products Elementor
Elementor elementor
Themelooks
Themelooks enter Addons
Wordpress
Wordpress wordpress

Sat, 13 Dec 2025 08:30:00 +0000

Type Values Removed Values Added
Description The Enter Addons plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Countdown and Image Comparison widgets in all versions up to, and including, 2.2.7 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Title Enter Addons <= 2.2.7 - Authenticated (Contributor+) Stored Cross-Site Scripting via Countdown and Image Comparison Widgets
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Elementor Elementor
Themelooks Enter Addons
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:18:49.118Z

Reserved: 2025-08-06T21:20:01.797Z

Link: CVE-2025-8687

cve-icon Vulnrichment

Updated: 2025-12-15T15:42:47.990Z

cve-icon NVD

Status : Deferred

Published: 2025-12-13T16:16:56.280

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-8687

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-20T19:00:10Z

Weaknesses