CVE-2026-4655
Stored XSS in Element Pack Addons SVG Widget Allows JS Injection
Publication date: 2026-04-08
Last updated on: 2026-04-08
Assigner: Wordfence
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| element_pack | addons_for_elementor | to 8.4.2 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-79 | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The vulnerability allows authenticated attackers with Contributor-level access to inject arbitrary JavaScript via SVG files, which can execute when users access affected pages. This could lead to unauthorized access or manipulation of user data.
Such unauthorized script execution may compromise the confidentiality and integrity of personal data, potentially violating data protection requirements under standards like GDPR and HIPAA.
However, the provided information does not explicitly detail the impact on compliance with these regulations.
Can you explain this vulnerability to me?
The Element Pack Addons for Elementor plugin for WordPress has a Stored Cross-Site Scripting (XSS) vulnerability in its SVG Image Widget in versions up to and including 8.4.2.
This vulnerability arises because the plugin fetches SVG content from remote URLs using the wp_safe_remote_get() function and then directly outputs this content to the page without proper sanitization or escaping.
Although a preg_replace() is applied to add attributes to the SVG tag, it does not remove malicious event handlers embedded in the SVG.
As a result, authenticated attackers with Contributor-level access or higher can inject arbitrary JavaScript into SVG files, which will execute whenever any user views a page containing the malicious SVG widget.
How can this vulnerability impact me? :
This vulnerability can allow attackers with Contributor-level access to inject malicious JavaScript code into SVG images displayed on your WordPress site.
When other users visit pages containing the compromised SVG widget, the injected JavaScript will execute in their browsers.
This can lead to theft of user credentials, session hijacking, defacement, or other malicious actions performed in the context of the affected website.
The CVSS score of 6.4 indicates a medium severity impact with low attack complexity but requiring some privileges.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability involves the Element Pack Addons for Elementor plugin for WordPress versions up to 8.4.2, specifically in the SVG Image Widget where malicious SVG content can be injected and executed.
To detect this vulnerability on your system, you should first verify if the plugin version installed is 8.4.2 or earlier.
Since the vulnerability involves stored cross-site scripting via SVG content fetched and rendered without proper sanitization, detection can include:
- Checking the plugin version installed on your WordPress site.
- Searching for SVG widgets in posts or pages that may contain suspicious or unexpected JavaScript event handlers embedded in SVG tags.
- Using WordPress CLI commands to list plugin versions, for example: `wp plugin list` to identify the version of Element Pack Addons for Elementor.
- Manually inspecting SVG content in the database or exported posts/pages for suspicious event handlers or JavaScript code.
No specific commands or automated detection scripts are provided in the available resources.
What immediate steps should I take to mitigate this vulnerability?
The primary mitigation step is to update the Element Pack Addons for Elementor plugin to a version later than 8.4.2 where this vulnerability is fixed.
Since the vulnerability allows authenticated users with Contributor-level access or higher to inject malicious SVG content, consider the following immediate actions:
- Restrict or review user roles and permissions to limit who can add or edit SVG Image Widgets.
- Temporarily disable or remove the SVG Image Widget usage until the plugin is updated.
- Audit existing SVG widgets for malicious code and remove any suspicious content.
Applying input sanitization or output escaping manually is not recommended as a primary fix since the vulnerability stems from the plugin's internal handling.