Critical Elementor Plugin Vulnerability Let Attackers Takeover WordPress Site Admin Control

03 December 2025
Critical Elementor Plugin Vulnerability Let Attackers Takeover WordPress Site Admin Control

A serious vulnerability has been discovered in the King Addons for Elementor WordPress plugin, affecting more than 10,000 active installations worldwide.

The flaw allows unauthenticated attackers to gain full administrative control over WordPress websites by simply registering a new account with administrator privileges.

The vulnerability was first reported on July 24th, 2025, and has now become the target of active exploitation campaigns.

Wordfence security analysts identified the vulnerability and disclosed it through their Wordfence Intelligence database on October 30th, 2025.

The vendor released a patched version on September 25th, 2025, addressing the underlying security flaw.

However, attackers began exploiting this vulnerability the very next day after public disclosure, on October 31st, 2025. The Wordfence Firewall has already blocked over 48,400 exploit attempts targeting affected websites.

Wordfence security researchers noted that this privilege escalation vulnerability poses a critical risk to any WordPress site running vulnerable versions of the plugin.

Once attackers gain administrative access, they can upload malicious files, modify website content, inject spam, or install backdoors that maintain persistent access to the compromised site.

The vulnerability stems from improper role restriction in the plugin’s user registration function.

Attackers exploit a weakness in how the plugin handles the registration process through the handle_register_ajax() function.

Technical Breakdown of the Attack Mechanism

The vulnerability lies in the plugin’s registration code, which fails to properly validate and restrict user roles during account creation.

When a user registers through the plugin’s login form, the code accepts a user_role parameter from the POST request without adequate validation.

An attacker can send a specially crafted registration request specifying ‘administrator’ as their intended role, and the plugin accepts this without question.

The vulnerable code snippet shows how the plugin processes the user_role field:-

$user_role = isset($_POST['user_role']) ? sanitize_text_field($_POST['user_role']) : '';
if (!empty($user_role) && $user_role !== 'subscriber') {
    $user_data['role'] = $user_role;
}
$user_id = wp_insert_user($user_data);

An attacker would send a POST request to the plugin’s AJAX handler with parameters like:-

POST/wp-admin/admin-ajax.php HTTP/1.1
action=king_addons_user_register&user_role=administrator&username=attacker_name&[email protected]

This request bypasses all authentication checks and creates a fully functional administrator account that the attacker can use to access WordPress.

Once inside, attackers have complete control to modify the website’s configuration, upload malicious plugins or themes, or inject harmful code into pages and posts.

AspectDetails
CVE IDCVE-2025-8489
CVSS Score9.8 (Critical)
Affected Versions24.12.92 – 51.1.14
Patched Version51.1.35
Vulnerability TypeUnauthenticated Privilege Escalation
Affected PluginKing Addons for Elementor
Installations10,000+
ResearcherPeter Thaleikis
Security Bounty$1,073.00
Exploitation StatusActive
Blocks Since Disclosure48,400+ attempts

Website administrators should update their King Addons for Elementor plugin to version 51.1.35 immediately to secure their installations against ongoing attacks.

Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

The post Critical Elementor Plugin Vulnerability Let Attackers Takeover WordPress Site Admin Control appeared first on Cyber Security News.



>>More