Home

Description

The ElementsKit Elementor Addons plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the `Live_Action::reset()` function in all versions up to, and including, 3.8.2 The function is hooked to the WordPress `init` action and triggers when both `post` and `action=elementor` GET parameters are present, with no authentication or nonce verification. This makes it possible for unauthenticated attackers to overwrite the Elementor content (`_elementor_data`) of any `elementskit_widget` custom post type by visiting a specially crafted URL. The widget's custom designs, text, and configurations are permanently replaced with a blank template.

PUBLISHED Reserved 2026-03-17 | Published 2026-05-05 | Updated 2026-05-05 | Assigner Wordfence




MEDIUM: 6.5CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L

Problem types

CWE-862 Missing Authorization

Product status

Default status
unaffected

Any version
affected

Timeline

2026-03-17:Vendor Notified
2026-05-04:Disclosed

Credits

Jack Pas finder

References

www.wordfence.com/...-65b2-4d27-935f-b0e73487f0c4?source=cve

plugins.trac.wordpress.org/...widget-builder/live-action.php

plugins.trac.wordpress.org/...widget-builder/live-action.php

plugins.trac.wordpress.org/...odules/widget-builder/init.php

plugins.trac.wordpress.org/...widget-builder/live-action.php

plugins.trac.wordpress.org/...%2Felementskit-lite/tags/3.9.0

cve.org (CVE-2026-4362)

nvd.nist.gov (CVE-2026-4362)

Download JSON