Unauthorized Data Modification in ElementsKit Elementor Addons Plugin for WordPress
CVE-2026-4362

6.5MEDIUM

What is CVE-2026-4362?

The ElementsKit Elementor Addons plugin for WordPress is susceptible to unauthorized data modification due to a lack of proper capability checks. This vulnerability affects all versions up to and including 3.8.2. An attacker can exploit this by sending a specially crafted request to the Live_Action::reset() function, which is triggered by the presence of the post and action=elementor GET parameters. Without the necessary authentication or nonce verification, attackers can overwrite the _elementor_data of any elementskit_widget custom post type, effectively replacing custom designs, text, and configurations with a blank template, leading to potential data loss and site disruption.

Affected Version(s)

ElementsKit Elementor Addons – Advanced Widgets & Templates Addons for Elementor 0 <= 3.8.2

References

CVSS V3.1

Score:
6.5
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Jack Pas
.