CVE-2025-0353
Description
The Divi Torque Lite – Best Divi Addon, Extensions, Modules & Social Modules plugin for WordPress is vulnerable to Stored Cross-Site Scripting via several widgets in all versions up to, and including, 4.1.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Stored XSS in Divi Torque Lite plugin for WordPress allows authenticated contributors to inject arbitrary scripts via widgets due to insufficient sanitization.
Vulnerability
Details The Divi Torque Lite plugin for WordPress, up to version 4.1.0, contains a Stored Cross-Site Scripting (XSS) vulnerability in several of its widgets. This arises from insufficient input sanitization and output escaping on user-supplied attributes, allowing attackers to inject malicious scripts that are stored on the server.
Exploitation
To exploit this vulnerability, an attacker must have at least contributor-level access to the WordPress site. They can inject arbitrary web scripts through widget attributes, which are then executed when any user views the affected page. No additional authentication or network position is required beyond the initial contributor access.
Impact
Successful exploitation enables the attacker to perform actions such as session hijacking, website defacement, or redirecting users to malicious sites. The injected scripts execute in the context of the victim's browser, potentially compromising sensitive data or user sessions.
Mitigation
The vulnerability has been addressed in a version beyond 4.1.0. Users are advised to update the Divi Torque Lite plugin to the latest available version from the WordPress plugin repository [1]. No workaround is currently documented.
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2- Range: <=4.1.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
15- plugins.trac.wordpress.org/browser/addons-for-divi/trunk/includes/modules/divi-4/FlipBox/FlipBox.phpnvd
- plugins.trac.wordpress.org/browser/addons-for-divi/trunk/includes/modules/divi-4/GradientHeading/GradientHeading.phpnvd
- plugins.trac.wordpress.org/browser/addons-for-divi/trunk/includes/modules/divi-4/ImageCarouselChild/ImageCarouselChild.phpnvd
- plugins.trac.wordpress.org/browser/addons-for-divi/trunk/includes/modules/divi-4/InfoBox/InfoBox.phpnvd
- plugins.trac.wordpress.org/browser/addons-for-divi/trunk/includes/modules/divi-4/InfoCard/InfoCard.phpnvd
- plugins.trac.wordpress.org/browser/addons-for-divi/trunk/includes/modules/divi-4/InlineNotice/InlineNotice.phpnvd
- plugins.trac.wordpress.org/browser/addons-for-divi/trunk/includes/modules/divi-4/LogoCarouselChild/LogoCarouselChild.phpnvd
- plugins.trac.wordpress.org/browser/addons-for-divi/trunk/includes/modules/divi-4/LogoGridChild/LogoGridChild.phpnvd
- plugins.trac.wordpress.org/browser/addons-for-divi/trunk/includes/modules/divi-4/Review/Review.phpnvd
- plugins.trac.wordpress.org/browser/addons-for-divi/trunk/includes/modules/divi-4/ScrollImage/ScrollImage.phpnvd
- plugins.trac.wordpress.org/browser/addons-for-divi/trunk/includes/modules/divi-4/Testimonial/Testimonial.phpnvd
- plugins.trac.wordpress.org/browser/addons-for-divi/trunk/includes/modules/divi-4/VideoModal/VideoModal.phpnvd
- plugins.trac.wordpress.org/changeset/3230743/nvd
- wordpress.org/plugins/addons-for-divi/nvd
- www.wordfence.com/threat-intel/vulnerabilities/id/d5810757-1866-4788-809f-2c68e16a5156nvd
News mentions
0No linked articles in our index yet.