CVE-2026-4362
MEDIUM
6,5
Source: [email protected]
Attack Vector: network
Attack Complexity: low
Privileges Required: none
User Interaction: none
Scope: unchanged
Confidentiality: none
Integrity: low
Availability: low
Description
AI Translation Available
The ElementsKit Elementor Addons plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the `Live_Action::reset()` function in all versions up to, and including, 3.8.2 The function is hooked to the WordPress `init` action and triggers when both `post` and `action=elementor` GET parameters are present, with no authentication or nonce verification. This makes it possible for unauthenticated attackers to overwrite the Elementor content (`_elementor_data`) of any `elementskit_widget` custom post type by visiting a specially crafted URL. The widget's custom designs, text, and configurations are permanently replaced with a blank template.
862
Missing Authorization
IncompleteCommon Consequences
Security Scopes Affected:
Confidentiality
Integrity
Access Control
Availability
Potential Impacts:
Read Application Data
Read Files Or Directories
Modify Application Data
Modify Files Or Directories
Gain Privileges Or Assume Identity
Bypass Protection Mechanism
Dos: Crash, Exit, Or Restart
Dos: Resource Consumption (Cpu)
Dos: Resource Consumption (Memory)
Dos: Resource Consumption (Other)
Applicable Platforms
Technologies:
AI/ML, Database Server, Not Technology-Specific, Web Server
https://plugins.trac.wordpress.org/browser/elementskit-lite/tags/3.8.0/modules/…
https://plugins.trac.wordpress.org/browser/elementskit-lite/tags/3.8.0/modules/…
https://plugins.trac.wordpress.org/browser/elementskit-lite/tags/3.8.0/modules/…
https://plugins.trac.wordpress.org/changeset/3499543/elementskit-lite/trunk/mod…
https://plugins.trac.wordpress.org/changeset?old_path=%2Felementskit-lite/tags/…
https://www.wordfence.com/threat-intel/vulnerabilities/id/7740fdfb-65b2-4d27-93…