CVE-2026-4655
Received Received - Intake
Stored XSS in Element Pack Addons SVG Widget Allows JS Injection

Publication date: 2026-04-08

Last updated on: 2026-04-08

Assigner: Wordfence

Description
The Element Pack Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the SVG Image Widget in versions up to and including 8.4.2. This is due to insufficient input sanitization and output escaping on SVG content fetched from remote URLs in the render_svg() function. The function fetches SVG content using wp_safe_remote_get() and then directly echoes it to the page without any sanitization, only applying a preg_replace() to add attributes to the SVG tag which does not remove malicious event handlers. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary JavaScript in SVG files that will execute whenever a user accesses a page containing the malicious widget.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-08
Last Modified
2026-04-08
Generated
2026-05-07
AI Q&A
2026-04-08
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
element_pack addons_for_elementor to 8.4.2 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability allows authenticated attackers with Contributor-level access to inject arbitrary JavaScript via SVG files, which can execute when users access affected pages. This could lead to unauthorized access or manipulation of user data.

Such unauthorized script execution may compromise the confidentiality and integrity of personal data, potentially violating data protection requirements under standards like GDPR and HIPAA.

However, the provided information does not explicitly detail the impact on compliance with these regulations.


Can you explain this vulnerability to me?

The Element Pack Addons for Elementor plugin for WordPress has a Stored Cross-Site Scripting (XSS) vulnerability in its SVG Image Widget in versions up to and including 8.4.2.

This vulnerability arises because the plugin fetches SVG content from remote URLs using the wp_safe_remote_get() function and then directly outputs this content to the page without proper sanitization or escaping.

Although a preg_replace() is applied to add attributes to the SVG tag, it does not remove malicious event handlers embedded in the SVG.

As a result, authenticated attackers with Contributor-level access or higher can inject arbitrary JavaScript into SVG files, which will execute whenever any user views a page containing the malicious SVG widget.


How can this vulnerability impact me? :

This vulnerability can allow attackers with Contributor-level access to inject malicious JavaScript code into SVG images displayed on your WordPress site.

When other users visit pages containing the compromised SVG widget, the injected JavaScript will execute in their browsers.

This can lead to theft of user credentials, session hijacking, defacement, or other malicious actions performed in the context of the affected website.

The CVSS score of 6.4 indicates a medium severity impact with low attack complexity but requiring some privileges.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability involves the Element Pack Addons for Elementor plugin for WordPress versions up to 8.4.2, specifically in the SVG Image Widget where malicious SVG content can be injected and executed.

To detect this vulnerability on your system, you should first verify if the plugin version installed is 8.4.2 or earlier.

Since the vulnerability involves stored cross-site scripting via SVG content fetched and rendered without proper sanitization, detection can include:

  • Checking the plugin version installed on your WordPress site.
  • Searching for SVG widgets in posts or pages that may contain suspicious or unexpected JavaScript event handlers embedded in SVG tags.
  • Using WordPress CLI commands to list plugin versions, for example: `wp plugin list` to identify the version of Element Pack Addons for Elementor.
  • Manually inspecting SVG content in the database or exported posts/pages for suspicious event handlers or JavaScript code.

No specific commands or automated detection scripts are provided in the available resources.


What immediate steps should I take to mitigate this vulnerability?

The primary mitigation step is to update the Element Pack Addons for Elementor plugin to a version later than 8.4.2 where this vulnerability is fixed.

Since the vulnerability allows authenticated users with Contributor-level access or higher to inject malicious SVG content, consider the following immediate actions:

  • Restrict or review user roles and permissions to limit who can add or edit SVG Image Widgets.
  • Temporarily disable or remove the SVG Image Widget usage until the plugin is updated.
  • Audit existing SVG widgets for malicious code and remove any suspicious content.

Applying input sanitization or output escaping manually is not recommended as a primary fix since the vulnerability stems from the plugin's internal handling.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart