CVE-2026-3426
MEDIUM
4,3
Source: [email protected]
Attack Vector: network
Attack Complexity: low
Privileges Required: low
User Interaction: none
Scope: unchanged
Confidentiality: none
Integrity: low
Availability: none
Description
AI Translation Available
The RTMKit Addons for Elementor plugin for WordPress is vulnerable to unauthorized modification of data due to missing capability checks on the save_widget() and reset_all_widgets() functions in all versions up to, and including, 2.0.2. This makes it possible for authenticated attackers, with Author-level access and above, to modify or reset site-wide widget configurations.
862
Missing Authorization
IncompleteCommon Consequences
Security Scopes Affected:
Confidentiality
Integrity
Access Control
Availability
Potential Impacts:
Read Application Data
Read Files Or Directories
Modify Application Data
Modify Files Or Directories
Gain Privileges Or Assume Identity
Bypass Protection Mechanism
Dos: Crash, Exit, Or Restart
Dos: Resource Consumption (Cpu)
Dos: Resource Consumption (Memory)
Dos: Resource Consumption (Other)
Applicable Platforms
Technologies:
AI/ML, Database Server, Not Technology-Specific, Web Server
https://plugins.trac.wordpress.org/browser/rometheme-for-elementor/trunk/Inc/Mo…
https://plugins.trac.wordpress.org/browser/rometheme-for-elementor/trunk/Inc/Mo…
https://plugins.trac.wordpress.org/browser/rometheme-for-elementor/trunk/Inc/Mo…
https://plugins.trac.wordpress.org/browser/rometheme-for-elementor/trunk/Inc/Mo…
https://plugins.trac.wordpress.org/changeset/3474369/
https://www.wordfence.com/threat-intel/vulnerabilities/id/632431eb-ea78-4c93-ac…