Home

Description

The Element Pack Addons for Elementor plugin for WordPress is vulnerable to arbitrary file reads in all versions up to, and including, 8.3.17 via the SVG widget and a lack of sufficient file validation in the 'render_svg' function. This makes it possible for authenticated attackers, with contributor-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information.

PUBLISHED Reserved 2026-02-03 | Published 2026-02-15 | Updated 2026-02-15 | Assigner Wordfence




MEDIUM: 6.5CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Problem types

CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Product status

Default status
unaffected

* (semver)
affected

Timeline

2026-02-03:Vendor Notified
2026-02-14:Disclosed

Credits

Chiao-Lin Yu finder

References

www.wordfence.com/...-6596-40b2-bcb6-d686e87d8d8f?source=cve

plugins.trac.wordpress.org/...vg-image/widgets/svg-image.php

plugins.trac.wordpress.org/...826/bdthemes-element-pack-lite

cve.org (CVE-2026-1793)

nvd.nist.gov (CVE-2026-1793)

Download JSON