CVE-2025-9698

6.8 MEDIUM

📋 TL;DR

The Plus Addons for Elementor WordPress plugin before version 6.3.16 fails to sanitize SVG file contents, allowing users with Author-level permissions to inject malicious scripts. This stored XSS vulnerability affects WordPress sites using vulnerable versions of this popular page builder extension.

💻 Affected Systems

Products:
  • Plus Addons for Elementor WordPress Plugin
Versions: All versions before 6.3.16
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress with Elementor and Plus Addons installed. Author role or higher access needed for exploitation.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal admin credentials, deface websites, redirect visitors to malicious sites, or install backdoors for persistent access.

🟠

Likely Case

Attackers with Author accounts inject malicious JavaScript that executes in visitors' browsers, potentially stealing session cookies or performing actions on behalf of users.

🟢

If Mitigated

With proper user role management and content filtering, impact is limited to potential data leakage from visitors viewing malicious content.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated user with at least Author privileges. SVG file upload with embedded JavaScript is the attack vector.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.3.16

Vendor Advisory: https://wpscan.com/vulnerability/a9539def-d92b-4117-b36a-17015c578d89/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Plus Addons for Elementor'. 4. Click 'Update Now' if available, or download version 6.3.16+ from WordPress repository. 5. Activate updated plugin.

🔧 Temporary Workarounds

Restrict SVG Uploads

all

Disable SVG file uploads for Author and lower roles using security plugins or custom code.

Limit User Roles

all

Review and minimize users with Author or higher privileges to reduce attack surface.

🧯 If You Can't Patch

  • Temporarily disable the Plus Addons plugin if not essential for site functionality
  • Implement web application firewall rules to block SVG uploads or sanitize SVG content

🔍 How to Verify

Check if Vulnerable:

Check plugin version in WordPress admin under Plugins → Installed Plugins. If version is below 6.3.16, you are vulnerable.

Check Version:

wp plugin list --name='Plus Addons for Elementor' --field=version

Verify Fix Applied:

Confirm plugin version is 6.3.16 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SVG file uploads by Author-level users
  • Multiple failed SVG upload attempts
  • Plugin version changes in WordPress logs

Network Indicators:

  • SVG file uploads to WordPress media endpoints
  • JavaScript execution from uploaded media files

SIEM Query:

source="wordpress" AND (event="plugin_update" AND plugin_name="Plus Addons for Elementor" AND version<"6.3.16") OR (event="media_upload" AND file_extension="svg" AND user_role="author")

🔗 References

📤 Share & Export