CVE-2025-9698
📋 TL;DR
The Plus Addons for Elementor WordPress plugin before version 6.3.16 fails to sanitize SVG file contents, allowing users with Author-level permissions to inject malicious scripts. This stored XSS vulnerability affects WordPress sites using vulnerable versions of this popular page builder extension.
💻 Affected Systems
- Plus Addons for Elementor WordPress Plugin
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Attackers could steal admin credentials, deface websites, redirect visitors to malicious sites, or install backdoors for persistent access.
Likely Case
Attackers with Author accounts inject malicious JavaScript that executes in visitors' browsers, potentially stealing session cookies or performing actions on behalf of users.
If Mitigated
With proper user role management and content filtering, impact is limited to potential data leakage from visitors viewing malicious content.
🎯 Exploit Status
Requires authenticated user with at least Author privileges. SVG file upload with embedded JavaScript is the attack vector.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 6.3.16
Vendor Advisory: https://wpscan.com/vulnerability/a9539def-d92b-4117-b36a-17015c578d89/
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Plus Addons for Elementor'. 4. Click 'Update Now' if available, or download version 6.3.16+ from WordPress repository. 5. Activate updated plugin.
🔧 Temporary Workarounds
Restrict SVG Uploads
allDisable SVG file uploads for Author and lower roles using security plugins or custom code.
Limit User Roles
allReview and minimize users with Author or higher privileges to reduce attack surface.
🧯 If You Can't Patch
- Temporarily disable the Plus Addons plugin if not essential for site functionality
- Implement web application firewall rules to block SVG uploads or sanitize SVG content
🔍 How to Verify
Check if Vulnerable:
Check plugin version in WordPress admin under Plugins → Installed Plugins. If version is below 6.3.16, you are vulnerable.
Check Version:
wp plugin list --name='Plus Addons for Elementor' --field=version
Verify Fix Applied:
Confirm plugin version is 6.3.16 or higher in WordPress admin panel.
📡 Detection & Monitoring
Log Indicators:
- Unusual SVG file uploads by Author-level users
- Multiple failed SVG upload attempts
- Plugin version changes in WordPress logs
Network Indicators:
- SVG file uploads to WordPress media endpoints
- JavaScript execution from uploaded media files
SIEM Query:
source="wordpress" AND (event="plugin_update" AND plugin_name="Plus Addons for Elementor" AND version<"6.3.16") OR (event="media_upload" AND file_extension="svg" AND user_role="author")