VYPR
Medium severity6.4NVD Advisory· Published Jul 29, 2025· Updated Apr 15, 2026

CVE-2025-8196

CVE-2025-8196

Description

The Magical Addons For Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Custom Attributes in all versions up to, and including, 1.3.8 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Authenticated contributors can inject stored XSS in Magical Addons For Elementor (≤1.3.8) via insufficiently sanitized Custom Attributes.

Vulnerability

Overview

CVE-2025-8196 is a stored cross-site scripting (XSS) vulnerability in the Magical Addons For Elementor plugin for WordPress, versions up to and including 1.3.8. The plugin's Custom Attributes feature fails to properly sanitize user-supplied input and escape output, allowing authenticated attackers with at least contributor-level access to inject arbitrary web scripts. These scripts are stored on the server and execute when any user visits the affected page [1].

Exploitation

Vector

An attacker must be an authenticated WordPress user with contributor-level privileges or higher. The vulnerability is triggered through the plugin's Custom Attributes functionality, which is exposed in the Elementor editor. Because the plugin does not sufficiently filter or escape user-supplied attribute values, an attacker can craft a malicious attribute containing JavaScript code. No special network access or additional authentication bypass is required beyond the contributor role [1].

Impact

Successful exploitation results in persistent XSS that executes in the context of the victim's browser. Any user—including administrators—who views the page containing the injected attribute will have the attacker's script executed, potentially leading to session hijacking, credential theft, defacement, or further compromise of the WordPress installation [1].

Mitigation

The vendor has released a patched version (1.3.9 or later) that addresses the insufficient sanitization and escaping. Users of the Magical Addons For Elementor plugin are strongly advised to update to the latest version immediately. No security workaround is available for unpatched installations [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.