Critical Elementor Plugin Vulnerability Let Attackers Takeover WordPress Site Admin Control

Critical Elementor Plugin Vulnerability Let Attackers Takeover Wordpress Site Admin Control

Wordpress Elementor Plugin Vulnerability

A critical security flaw in the popular “King Addons for Elementor” WordPress plugin has left thousands of websites at risk of complete takeover, security researchers have warned.

The vulnerability, tracked as CVE-2025-8489, allows unauthenticated attackers to register new accounts with full administrator rights by abusing an insecure registration function in the plugin.

King Addons for Elementor has more than 10,000 active installations, making this a serious threat to many site owners. The issue affects plugin versions 24.12.92 through 51.1.14.

Elementor Plugin Vulnerability

In these versions, the plugin’s registration code fails to restrict which user roles can be assigned during signup properly.

An attacker can send a crafted request to the WordPress admin-ajax.php endpoint and set the “user_role” field to “administrator”.

This lets them create a new admin-level account without logging in or proving prior access. Once an attacker gains administrator privileges, they can fully control the site.

google

Attribute Details
Vulnerability Name King Addons for Elementor – Unauthenticated Privilege Escalation
CVE ID CVE-2025-8489
CVSS Rating 9.8 (Critical)
Vulnerability Type Unauthenticated Privilege Escalation
Affected Plugin King Addons for Elementor

This includes installing malicious plugins or themes with backdoors, as well as modifying posts and pages. Redirecting visitors to malicious websites or injecting spam and phishing content.

In short, this vulnerability can lead to a complete site compromise. The flaw is rated 9.8 (Critical) under the CVSS scoring system. The plugin developer released a patched version, 51.1.35, on September 25th, 2025.

Security firm Wordfence added a firewall rule to block attacks for its Premium, Care, and Response customers on August 4th, 2025.

And rolled out the same protection to free users on September 3rd, 2025. However, attackers began actively exploiting the bug shortly after public disclosure on October 30th, 2025

According to Wordfence, its firewall has already blocked more than 48,400 exploit attempts targeting this vulnerability. Attack traffic spiked especially on November 9th and 10th.

Several IP addresses have been identified as significant sources of attacks, including 45.61.157.120 and 2602: fa59:3:424::1.

IP Address Blocked Requests
45.61.157.120 28,900+
2602:fa59:3:424::1 16,900+
182.8.226.228 300+
138.199.21.230 100+
206.238.221.25 100+

Each is responsible for tens of thousands of blocked requests. Website owners using King Addons for Elementor are strongly urged to do the following.

Update immediately to version 51.1.35 or later. Check for any unknown or suspicious administrator accounts.

Review server and access logs for requests from known attacking IPs. Monitor for unusual changes to content, plugins, or themes.

Those who suspect their site may be compromised should seek professional incident response and cleanup services as soon as possible.

Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

googlenews



Source link