Description
The Ultra Addons Lite for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'Animated Text' field of the Typeout Widget in version 1.1.9 and below due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: 2025-10-03
Score: 6.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting
Action: Patch
AI Analysis

Impact

The code in the Animated Text field of the Typeout Widget in Ultra Addons Lite for Elementor versions up to 1.1.9 does not properly validate or escape user input. This deficiency allows an attacker with contributor or higher permissions to insert arbitrary JavaScript that is stored and rendered within page content. When a page containing the edited widget is viewed, the attacker’s script runs in the visitor’s browser, leading to theft of user data, session hijacking, defacement, or deflecting victim traffic. The weakness corresponds to CWE‑79, a classic reflected and stored XSS scenario.

Affected Systems

Ultrapressorg Ultra Addons Lite for Elementor is affected when running version 1.1.9 or earlier. Modern installations (version 1.2.0 and above) contain the fix. Administrators should check the exact version in the WordPress plugin list and ensure the plugin is current or removed.

Risk and Exploitability

The CVSS score of 6.4 indicates moderate severity. The EPSS score of less than 1% suggests a very low current exploitation likelihood, and the vulnerability is not listed in the CISA KEV catalog. However, because the attack requires authenticated contributor‑level access, any site that allows contributors to edit content is at risk. Attackers can embed malicious scripts that execute in the browsers of all visitors to the affected page. The impact is limited to the scope of the site’s content rather than system-wide compromise. The likely attack vector is through the WordPress administrative interface, where a contributor can edit the Typeout Widget and submit malicious content, which is then stored and later rendered to all users.

Generated by OpenCVE AI on April 21, 2026 at 02:37 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Ultra Addons Lite for Elementor to version 1.2.0 or later, which removes the XSS vulnerability.
  • If an upgrade is not possible, delete the Typeout Widget or set its content to a trusted value and disable editing permissions for contributors on that widget.
  • As a temporary measure, restrict contributor access to the WordPress backend or disable content editing for users with less than administrator privileges until a patch is applied.

Generated by OpenCVE AI on April 21, 2026 at 02:37 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-32274 The Ultra Addons Lite for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'Animated Text' field of the Typeout Widget in version 1.1.9 and below due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
History

Wed, 08 Apr 2026 17:45:00 +0000


Mon, 06 Oct 2025 14:45:00 +0000

Type Values Removed Values Added
First Time appeared Elementor
Elementor elementor
Ultrapressorg
Ultrapressorg ultra Addons Lite For Elementor
Wordpress
Wordpress wordpress
Vendors & Products Elementor
Elementor elementor
Ultrapressorg
Ultrapressorg ultra Addons Lite For Elementor
Wordpress
Wordpress wordpress

Fri, 03 Oct 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 03 Oct 2025 11:30:00 +0000

Type Values Removed Values Added
Description The Ultra Addons Lite for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'Animated Text' field of the Typeout Widget in version 1.1.9 and below due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Title Ultra Addons Lite for Elementor <= 1.1.9 - Authenticated (Contributor+) Stored Cross-Site Scripting via Animated Text Field
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Elementor Elementor
Ultrapressorg Ultra Addons Lite For Elementor
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:52:30.224Z

Reserved: 2025-08-15T15:32:57.491Z

Link: CVE-2025-9077

cve-icon Vulnrichment

Updated: 2025-10-03T18:10:09.941Z

cve-icon NVD

Status : Deferred

Published: 2025-10-03T12:15:45.517

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-9077

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T02:45:25Z

Weaknesses