VYPR
Medium severity6.5NVD Advisory· Published May 19, 2025· Updated Apr 23, 2026

CVE-2025-48288

CVE-2025-48288

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Element Invader ElementInvader Addons for Elementor elementinvader-addons-for-elementor allows Stored XSS.This issue affects ElementInvader Addons for Elementor: from n/a through <= 1.3.5.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Stored XSS in ElementInvader Addons for Elementor (<=1.3.5) allows privileged users to inject malicious scripts via improper input neutralization.

Vulnerability

Overview

CVE-2025-48288 describes a Stored Cross-Site Scripting (XSS) vulnerability in the ElementInvader Addons for Elementor plugin for WordPress, affecting versions up to and including 1.3.5. The root cause is improper neutralization of user input during web page generation, allowing a user with certain privileges to inject arbitrary web scripts or HTML that are stored on the server and later executed in the context of other users' browsers [1].

Exploitation

Prerequisites

Exploitation requires a privileged user (e.g., an editor or administrator) to perform an action such as clicking a crafted link or visiting a specially prepared page. While the vulnerability can be initiated by a user with moderate privileges, successful exploitation also depends on a subsequent privileged user interacting with the injected content — the CVSS v3 base score of 6.5 reflects this requirement for user interaction [1].

Impact

An attacker who successfully exploits this vulnerability can inject malicious scripts that execute when other users (including site visitors) access the affected page. Potential impacts include redirecting visitors to malicious sites, serving advertisements, stealing session cookies, or defacing the website [1].

Mitigation

The vulnerability is addressed in version 1.3.6 of the plugin. Users are strongly advised to update immediately. For sites where immediate update is not possible, contacting the hosting provider or a web developer is recommended. Additionally, enabling auto-updates for vulnerable plugins via Patchstack can help protect against this and similar threats [1].

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.