The Essential Addons for Elementor plugin for WordPress is vulnerable to privilege escalation in versions up to and including 4.6.4 due to a lack of restrictions on who can add a registration form and a custom registration role to an Elementor created page. This makes it possible for attackers with access to the Elementor page builder to create a new registration form that defaults to the user role being set to administrator and subsequently register as an administrative user.
Metrics
Affected Vendors & Products
References
History
Fri, 10 Jan 2025 15:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:2.3:a:wpdeveloper:essential_addons_for_elementor:*:*:*:*:lite:wordpress:*:* |
Wed, 16 Oct 2024 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Wpdeveloper
Wpdeveloper essential Addons For Elementor |
|
CPEs | cpe:2.3:a:wpdeveloper:essential_addons_for_elementor:-:*:*:*:*:wordpress:*:* | |
Vendors & Products |
Wpdeveloper
Wpdeveloper essential Addons For Elementor |
|
Metrics |
ssvc
|
Wed, 16 Oct 2024 07:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The Essential Addons for Elementor plugin for WordPress is vulnerable to privilege escalation in versions up to and including 4.6.4 due to a lack of restrictions on who can add a registration form and a custom registration role to an Elementor created page. This makes it possible for attackers with access to the Elementor page builder to create a new registration form that defaults to the user role being set to administrator and subsequently register as an administrative user. | |
Title | Essential Addons for Elementor <= 4.6.4 - Authenticated (Contributor+) Privilege Escalation | |
Weaknesses | CWE-862 | |
References |
|
|
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2024-10-16T19:36:14.328Z
Reserved: 2024-10-15T18:28:44.994Z
Link: CVE-2021-4447

Updated: 2024-10-16T19:36:09.590Z

Status : Analyzed
Published: 2024-10-16T07:15:10.687
Modified: 2025-01-10T14:39:08.560
Link: CVE-2021-4447

No data.