CVE-2025-1456

6.4 MEDIUM

📋 TL;DR

This stored XSS vulnerability in the Royal Elementor Addons WordPress plugin allows authenticated attackers with Contributor-level access or higher to inject malicious scripts into website pages. The scripts execute whenever users visit compromised pages, potentially leading to session hijacking, credential theft, or malware distribution. All WordPress sites using vulnerable plugin versions are affected.

💻 Affected Systems

Products:
  • Royal Elementor Addons and Templates WordPress plugin
Versions: All versions up to and including 1.7.1012
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with the vulnerable plugin enabled. Contributor-level access or higher is needed for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator credentials, install backdoors, redirect users to malicious sites, or perform actions on behalf of authenticated users, potentially leading to complete site compromise.

🟠

Likely Case

Attackers with contributor access inject malicious scripts to steal user session cookies, display phishing content, or redirect users to malicious websites.

🟢

If Mitigated

With proper input validation and output escaping, the vulnerability would be prevented, and with strict user role management, the attack surface would be significantly reduced.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward once authenticated. The vulnerability details are publicly documented.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.7.1013

Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3262790/royal-elementor-addons/tags/1.7.1013/assets/js/frontend.js

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'Royal Elementor Addons and Templates'. 4. Click 'Update Now' if available. 5. Alternatively, download version 1.7.1013 from WordPress repository and manually update.

🔧 Temporary Workarounds

Temporary Plugin Deactivation

all

Disable the vulnerable plugin until patched

wp plugin deactivate royal-elementor-addons

Restrict User Roles

all

Temporarily remove Contributor and Author roles or restrict their capabilities

Use WordPress role management plugins or custom code to restrict capabilities

🧯 If You Can't Patch

  • Implement Web Application Firewall (WAF) rules to block XSS payloads
  • Enable Content Security Policy (CSP) headers to restrict script execution

🔍 How to Verify

Check if Vulnerable:

Check plugin version in WordPress admin under Plugins > Installed Plugins. If version is 1.7.1012 or lower, you are vulnerable.

Check Version:

wp plugin get royal-elementor-addons --field=version

Verify Fix Applied:

After updating, verify the plugin version shows 1.7.1013 or higher in WordPress admin.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to widget-related endpoints
  • Multiple failed login attempts followed by successful contributor login
  • Suspicious JavaScript in page content or database

Network Indicators:

  • Unexpected script tags in HTTP responses
  • Requests to external domains from page content

SIEM Query:

source="wordpress.log" AND ("widgetGrid" OR "widgetCountDown" OR "widgetInstagramFeed") AND status=200

🔗 References

📤 Share & Export