Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Why Organizations Are Abandoning Static Secrets for Managed Identities

November 2, 2025

‘Jingle Thief’ Hackers Exploit Cloud Infrastructure to Steal Millions in Gift Cards

November 2, 2025

Over 250 Magento Stores Hit Overnight as Hackers Exploit New Adobe Commerce Flaw

November 1, 2025
Facebook X (Twitter) Instagram
Sunday, November 2
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Critical Flaws Found in Elementor King Addons Affect 10,000 Sites
News

Critical Flaws Found in Elementor King Addons Affect 10,000 Sites

Team-CWDBy Team-CWDOctober 30, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A popular Elementor extension for WordPress that helps users build contact forms, sliders, pricing tables and login workflows has been found vulnerable.

The King Addons for Elementor plugin, used on over 10,000 sites, contains two unauthenticated critical issues that can lead to full site takeover.

New research from Patchstack shows two easily exploitable flaws:

  • An unauthenticated arbitrary file upload vulnerability (CVE-2025-6327), allowing attackers to place files in web-accessible directories

  • A privilege escalation via registration endpoint flaw (CVE-2025-6325), allowing account creation with arbitrary roles

The upload flaw stems from an AJAX handler that exposes a nonce to every visitor via localized script data, allowing unauthenticated users to trigger the upload call.

Further, validation also failed because the file_validity() method returned a non-empty string instead of false for invalid file types, and the allowed_file_types parameter could be manipulated to accept unwanted files into wp-content/uploads/king-addons/forms/.

The privilege escalation issue arose from a registration handler that accepted client-supplied roles. When site registration was enabled and the King Addons Register widget was present, an attacker could POST action=king_addons_user_register with user_role=administrator to create a full administrator account.

Read more on privilege escalation attacks: Privilege Escalation Flaw Found in Azure Machine Learning Service

The vendor addressed the vulnerabilities across two versions.

Key improvements include:

  • A role allowlist and input sanitization to restrict new accounts to safe roles such as subscriber and customer

  • The upload handler now requires proper permission (upload_files) and enforces strict file type validation

Site administrators should verify whether the “King Addons Login | Register Form” widget is active on any page and update the plugin to version 51.1.37 immediately.

The patched release closes both the file upload and privilege escalation vulnerabilities, significantly reducing the risk of full site compromise.

“Both vulnerabilities are trivially exploitable under common configurations and require no authentication,” Patchstack wrote.

“Immediate patching is strongly recommended.”

Image credit: Wirestock Creators / Shutterstock.com



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleTARmageddon Flaw in Async-Tar Rust Library Could Enable Remote Code Execution
Next Article Researchers Identify PassiveNeuron APT Using Neursite and NeuralExecutor Malware
Team-CWD
  • Website

Related Posts

News

Why Organizations Are Abandoning Static Secrets for Managed Identities

November 2, 2025
News

‘Jingle Thief’ Hackers Exploit Cloud Infrastructure to Steal Millions in Gift Cards

November 2, 2025
News

Over 250 Magento Stores Hit Overnight as Hackers Exploit New Adobe Commerce Flaw

November 1, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest News

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202512 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views

The risks of unsupported IoT tech

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202512 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views
Our Picks

The hidden risks of browser extensions – and how to avoid them

September 13, 2025

Don’t let “back to school” become “back to bullying”

September 11, 2025

Why you should never pay to get paid

September 15, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2025 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.