CVE-2025-9698
Description
The Plus Addons for Elementor WordPress plugin before 6.3.16 does not sanitize SVG file contents, which could allow users with minimum role access as Author to perform Stored Cross-Site Scripting attacks.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
The Plus Addons for Elementor plugin before 6.3.16 lacks SVG sanitization, allowing Author-level stored XSS.
CVE-2025-9698 is a stored cross-site scripting (XSS) vulnerability in the Plus Addons for Elementor WordPress plugin (versions prior to 6.3.16). The root cause is the plugin's failure to properly sanitize SVG file contents uploaded by users. This oversight allows malicious JavaScript to be embedded within SVG files [1].
An attacker must have at least Author-level access to upload media, which is a standard role in WordPress. After uploading a crafted SVG file containing JavaScript, the malicious payload is stored on the server and later executed in the browser of any user (including administrators) when the SVG is rendered or previewed [1].
Successful exploitation enables an attacker to perform a wide range of actions in the context of the victim's session, such as modifying page content, stealing session cookies, or performing administrative actions without authorization. The CVSS v3 base score of 6.8 (Medium) reflects the requirement for authenticated access but the potential for high impact on confidentiality, integrity, and availability [1].
The vulnerability has been addressed in version 6.3.16 of the plugin. Administrators are strongly advised to update to this patched version or later. No workaround is currently available for older versions [1].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1- Range: <6.3.16
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1News mentions
0No linked articles in our index yet.