PT-2026-31111 · Bdthemes · Element Pack – Widgets
Craig Smith
·
Published
2026-04-08
·
Updated
2026-04-08
·
CVE-2026-4655
CVSS v3.1
6.4
Medium
| AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N |
The Element Pack Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the SVG Image Widget in versions up to and including 8.4.2. This is due to insufficient input sanitization and output escaping on SVG content fetched from remote URLs in the render svg() function. The function fetches SVG content using wp safe remote get() and then directly echoes it to the page without any sanitization, only applying a preg replace() to add attributes to the SVG tag which does not remove malicious event handlers. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary JavaScript in SVG files that will execute whenever a user accesses a page containing the malicious widget.
Fix
XSS
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Element Pack – Widgets