Hong Kong Community Advisory XSS in Addons(CVE20261512)

Cross Site Scripting (XSS) in WordPress Essential Addons for Elementor Plugin
Plugin Name Essential Addons for Elementor
Type of Vulnerability Cross-Site Scripting (XSS)
CVE Number CVE-2026-1512
Urgency Low
CVE Publish Date 2026-02-15
Source URL CVE-2026-1512

Authenticated Contributor Stored XSS in Essential Addons for Elementor (CVE-2026-1512): What Every WordPress Site Owner Should Do Now

Date: 2026-02-16
Author: Hong Kong Security Expert
Tags: WordPress, Security, WAF, XSS, Plugin Vulnerability

Summary: A stored Cross‑Site Scripting (XSS) vulnerability (CVE‑2026‑1512) affecting Essential Addons for Elementor (<= 6.5.9) has been disclosed. Authenticated users with the Contributor role can inject malicious JavaScript via the Info Box widget that is stored and executed when other users or public visitors view the affected content. A fixed release (6.5.10 or later) is available — update immediately. This article explains the threat, exploitation scenarios, detection, containment, and concrete mitigation steps you can apply right away.

Table of contents

The vulnerability at a glance

  • Affected software: Essential Addons for Elementor (WordPress plugin).
  • Vulnerable versions: <= 6.5.9
  • Fixed in: 6.5.10
  • Vulnerability type: Stored Cross‑Site Scripting (XSS)
  • CVE: CVE‑2026‑1512
  • Required privilege: Authenticated contributor (or higher)
  • User interaction: Required (UI:R)
  • CVSS (as assessed publicly): 6.5 (vector: AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L)

In short: an authenticated user with Contributor privileges can save a payload via the Info Box widget that will be stored and later executed in the browser of other visitors (including administrators) who view the widget output. Because the payload is persistent, attackers can weaponize it for ongoing exploitation.

Why this matters: Contributor role and stored XSS

Many site owners assume contributors are low risk because they cannot publish content directly or manage plugins. In practice:

  • Contributors can create posts and submit content for review — content that may be rendered on the front end or previewed by editors and admins.
  • Stored XSS is dangerous because the malicious script is kept in the database and will run whenever the affected page loads, potentially targeting logged‑in administrators or other privileged users.
  • An attacker controlling a contributor account can use social engineering (for example, tricking an admin to preview a post) to cause higher‑privileged users to execute the stored payload and thereby escalate the attack.

Because the vulnerable vector is a visual element (Info Box widget) used in many page builds and previews, the risk surface spans pages, templates, and admin preview pages.

Technical analysis (high level)

Non‑exploitative technical details useful to defenders:

What’s failing

  • The plugin accepts user-provided content for one or more Info Box widget fields and stores it in the database.
  • When rendering the Info Box on the page (or in preview), the plugin outputs that content without sufficient escaping or sanitization for the output context.
  • As a result, an attacker can include HTML and JavaScript in the stored field. When the page is viewed, that script executes in the victim’s browser under the site’s origin.

Why that leads to danger

  • Scripts running in the context of your site inherit the visiting user’s browser privileges on that origin. For administrators, a stored XSS can enable actions like creating users, changing settings, exporting data, or installing backdoors.
  • The CVSS vector indicates network exploitable, low complexity, requiring low privileges (authenticated contributor), and requiring user interaction — commonly social engineering an administrator to preview content.

Output contexts matter

  • If the field is inserted as innerHTML, script and event handlers are dangerous.
  • If the field is placed into attributes (href, src, style) without filtering, javascript: URIs, data: URIs, or event attributes are dangerous.
  • Proper defence requires sanitizing input and escaping output for the correct context (esc_html, esc_attr, esc_url, or context‑appropriate filtering).

Attack scenarios and real‑world impact

Scenario A — Admin targeted preview

  1. Attacker has a Contributor account.
  2. They create a post/page using the Info Box widget and include a crafted payload.
  3. An editor or admin previews the post and the stored script runs in the admin’s browser.
  4. The script exfiltrates an admin token or performs actions via the admin’s session, leading to site takeover.

Impact: site takeover, data exfiltration, content defacement, reputation damage.

Scenario B — Public visitor exploitation

  1. Attacker ensures the malicious page is published or becomes accessible.
  2. Any visitor opening the page will have the script executed; consequences include redirects to phishing pages, injected ads, or client-side cryptomining.
  3. If many users are logged in (customers, moderators), an attacker may specifically target those cohorts.

Impact: legal/compliance exposure if user data is exposed, loss of revenue, customer trust erosion.

Scenario C — Supply chain or downstream attack

  1. The attacker’s script performs persistence actions: modifies theme files, writes backdoors, or schedules tasks.
  2. Those artifacts remain even after the original widget is removed.

Impact: forensic complexity, longer cleanup, potential site rebuild.

Exploitation difficulty and prerequisites

  • Privileges required: Contributor (authenticated account).
  • Interaction: Requires someone (often an admin/editor) to view the stored payload in a rendering context.
  • Complexity: Medium. Crafting the stored XSS is straightforward for an attacker who understands widget fields; the main challenge is getting a privileged user to execute it.

Because many sites permit registration or assign Contributor-like roles, this vulnerability is significant even if the CVSS is not critical.

How to detect potential exploitation on your site

Indicators to look for:

  • Unexpected HTML or script tags in Info Box widgets.
  • Drafts containing HTML or script-like content from Contributor accounts.
  • Admins/editors reporting strange popups or unexpected behaviour when previewing content.
  • New user accounts using disposable email domains or unusual names.
  • Unauthorized changes to plugin/theme files or new PHP files appearing.
  • Suspicious outgoing network traffic from the server (beacons to unknown hosts).
  • Modified cron jobs or unexplained scheduled tasks.

Tools and logs to check

  • WordPress activity logs: edits by Contributors matching the timeline of anomalies.
  • Web server access logs: repeated POSTs to editor endpoints from the same account or IP.
  • WAF logs (if present): rule triggers for script-like content in POST bodies.
  • File system timestamps: unexpected modifications to plugin/theme files.
  • Database search: look for Info Box fields containing