CVE-2025-6252

6.4 MEDIUM

📋 TL;DR

The Qi Addons For Elementor WordPress plugin has a stored cross-site scripting (XSS) vulnerability that allows authenticated attackers with Contributor-level access or higher to inject malicious scripts into web pages. These scripts execute whenever users visit the compromised pages, potentially stealing credentials or performing unauthorized actions. All WordPress sites using this plugin up to version 1.9.1 are affected.

💻 Affected Systems

Products:
  • Qi Addons For Elementor WordPress plugin
Versions: All versions up to and including 1.9.1
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with the vulnerable plugin enabled. Contributor-level access or higher is needed for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator credentials, hijack user sessions, redirect visitors to malicious sites, or deface websites, potentially leading to complete site compromise and data theft.

🟠

Likely Case

Attackers with contributor access inject malicious scripts to steal user cookies and session tokens, enabling account takeover and privilege escalation.

🟢

If Mitigated

With proper input validation and output escaping, the vulnerability would be prevented, and with strong access controls limiting contributor permissions, the attack surface would be significantly reduced.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is technically simple once an attacker has contributor credentials. The vulnerability is well-documented in security advisories.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.9.2 or later

Vendor Advisory: https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3318746%40qi-addons-for-elementor%2Ftrunk&old=3308494%40qi-addons-for-elementor%2Ftrunk&sfp_email=&sfph_mail=

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'Qi Addons For Elementor' and click 'Update Now'. 4. Verify the plugin version is 1.9.2 or higher.

🔧 Temporary Workarounds

Disable vulnerable plugin

all

Temporarily deactivate the Qi Addons For Elementor plugin until patched

wp plugin deactivate qi-addons-for-elementor

Restrict user roles

all

Temporarily remove Contributor role access or limit to trusted users only

🧯 If You Can't Patch

  • Implement a web application firewall (WAF) with XSS protection rules
  • Regularly audit user accounts and remove unnecessary Contributor-level access

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Installed Plugins for Qi Addons For Elementor version

Check Version:

wp plugin get qi-addons-for-elementor --field=version

Verify Fix Applied:

Verify plugin version is 1.9.2 or higher in WordPress admin panel

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to plugin endpoints with script tags
  • Multiple failed login attempts followed by successful contributor login

Network Indicators:

  • Inbound traffic to plugin-specific endpoints containing script payloads
  • Outbound connections to suspicious domains after page loads

SIEM Query:

source="wordpress.log" AND ("qi-addons" OR "elementor") AND ("<script>" OR "javascript:" OR "onerror=" OR "onload=")

🔗 References

📤 Share & Export