CVE-2025-4783

6.4 MEDIUM

📋 TL;DR

The Exclusive Addons for Elementor WordPress plugin has a stored XSS vulnerability in its Countdown Timer Widget. Authenticated attackers with Contributor access or higher can inject malicious scripts that execute when users view affected pages. This affects all WordPress sites using the plugin up to version 2.7.9.1.

💻 Affected Systems

Products:
  • Exclusive Addons for Elementor WordPress Plugin
Versions: All versions up to and including 2.7.9.1
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress with Elementor and the Exclusive Addons plugin installed. Contributor-level access or higher needed for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal admin credentials, redirect users to malicious sites, deface websites, or install backdoors for persistent access.

🟠

Likely Case

Attackers with contributor accounts inject malicious scripts to steal user session cookies or redirect visitors to phishing pages.

🟢

If Mitigated

With proper user access controls and content security policies, impact is limited to potential defacement of affected pages.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is technically simple once attacker has contributor-level credentials.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.8.0 or later

Vendor Advisory: https://wordpress.org/plugins/exclusive-addons-for-elementor/#developers

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'Exclusive Addons for Elementor'. 4. Click 'Update Now' if available. 5. If no update available, download version 2.8.0+ from WordPress.org and manually update.

🔧 Temporary Workarounds

Disable Countdown Timer Widget

all

Temporarily disable the vulnerable widget while awaiting patch

Navigate to WordPress admin > Elementor > Settings > Advanced > Disable Countdown Timer Widget

Implement Content Security Policy

all

Add CSP headers to restrict script execution

Add to .htaccess: Header set Content-Security-Policy "script-src 'self'"
Or use WordPress security plugin to implement CSP

🧯 If You Can't Patch

  • Restrict user roles: Remove contributor access or implement strict user role management
  • Implement WAF rules to block XSS payloads in HTML attributes

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin > Plugins > Exclusive Addons for Elementor. If version is 2.7.9.1 or lower, you are vulnerable.

Check Version:

wp plugin list --name=exclusive-addons-for-elementor --field=version

Verify Fix Applied:

After update, verify plugin version is 2.8.0 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /wp-admin/admin-ajax.php with HTML attribute payloads
  • Multiple failed login attempts followed by successful contributor login

Network Indicators:

  • Outbound connections to suspicious domains after page loads
  • Unusual JavaScript execution patterns

SIEM Query:

source="wordpress" AND (uri_path="/wp-admin/admin-ajax.php" AND http_method="POST" AND (request_body LIKE "%onload=%" OR request_body LIKE "%onerror=%" OR request_body LIKE "%javascript:%"))

🔗 References

📤 Share & Export