Saturday, May 24, 2025
HomeCVE/vulnerabilityMillions of WordPress Websites Vulnerable to Script Injection Due to Plugin Flaw

Millions of WordPress Websites Vulnerable to Script Injection Due to Plugin Flaw

Published on

SIEM as a Service

Follow Us on Google News

A critical security vulnerability in the Essential Addons for Elementor plugin, installed on over 2 million WordPress websites, has exposed sites to script injection attacks via malicious URL parameters.

The flaw, tracked as CVE-2025-24752 and scoring 7.1 (High) on the CVSS scale, allowed attackers to execute reflected cross-site scripting (XSS) attacks by exploiting insufficient input sanitization in the plugin’s password reset functionality, as per a report by Patchstack.

Vulnerability Overview

The vulnerability stemmed from improper handling of the popup-selector query parameter in the plugin’s JavaScript code.

- Advertisement - Google News

Attackers could craft URLs containing malicious scripts in this parameter, which were executed when unsuspecting users clicked the link.

This type of reflected XSS attack enables session hijacking, phishing redirects, or malware distribution by exploiting the victim’s browser trust in the compromised website.

The vulnerable code resided in the src/js/view/general.js file:

$(document).ready(function(){

    let resetPasswordParams = new URLSearchParams(location.search);

    if ( resetPasswordParams.has('popup-selector') && (

         resetPasswordParams.has('eael-lostpassword')

         || resetPasswordParams.has('eael-resetpassword')

    )) {

        let popupSelector = resetPasswordParams.get('popup-selector');

        if(popupSelector.length){

            popupSelector = popupSelector.replace(/_/g," ");

            setTimeout(function(){

                jQuery(popupSelector).trigger('click');

            }, 300);

        }

    }

});

Here, the popup-selector value was retrieved from the URL and injected into the page without validating or escaping its contents, allowing attackers to insert arbitrary JavaScript code.

For example, a URL like https://victim-site.com/?popup-selector=<script>malicious-code</script> would execute the payload.

Patch and Mitigation

The plugin’s developers, WPDeveloper, released version 6.0.15 to address the flaw by implementing strict input validation.

The patched code restricts popup-selector values to alphanumeric characters and specific safe symbols, neutralizing XSS vectors:

// Patched validation logic

popupSelector = popupSelector.replace(/[^a-zA-Z0-9-_. ]/g, "");
The patch
The patch

WordPress administrators are urged to immediately update to at least v6.0.15. Those unable to patch should consider disabling the plugin until updates are applied.

This incident underscores persistent risks in WordPress ecosystems, where popular plugins become high-value targets. Essential Addons ranks among Elementor’s most installed extensions, amplifying the flaw’s blast radius.

Sucuri researcher Ben Martin notes, “XSS flaws in plugins with millions of users can enable mass compromise campaigns. Rigorous input sanitization is non-negotiable for plugin developers”.

WordPress users remain advised to enable auto-updates and conduct regular security audits. As of February 2025, no widespread exploits have been reported, but delayed patching could lead to cascading breaches.

Collect Threat Intelligence on the Latest Malware and Phishing Attacks with ANY.RUN TI Lookup -> Try for free

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Zero-Trust Policy Bypass Enables Exploitation of Vulnerabilities and Manipulation of NHI Secrets

A new project has exposed a critical attack vector that exploits protocol vulnerabilities to...

Threat Actor Sells Burger King Backup System RCE Vulnerability for $4,000

A threat actor known as #LongNight has reportedly put up for sale remote code...

Chinese Nexus Hackers Exploit Ivanti Endpoint Manager Mobile Vulnerability

Ivanti disclosed two critical vulnerabilities, identified as CVE-2025-4427 and CVE-2025-4428, affecting Ivanti Endpoint Manager...

Hackers Target macOS Users with Fake Ledger Apps to Deploy Malware

Hackers are increasingly targeting macOS users with malicious clones of Ledger Live, the popular...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Zero-Trust Policy Bypass Enables Exploitation of Vulnerabilities and Manipulation of NHI Secrets

A new project has exposed a critical attack vector that exploits protocol vulnerabilities to...

Threat Actor Sells Burger King Backup System RCE Vulnerability for $4,000

A threat actor known as #LongNight has reportedly put up for sale remote code...

Chinese Nexus Hackers Exploit Ivanti Endpoint Manager Mobile Vulnerability

Ivanti disclosed two critical vulnerabilities, identified as CVE-2025-4427 and CVE-2025-4428, affecting Ivanti Endpoint Manager...