Home

Description

The Royal Elementor Addons plugin for WordPress is vulnerable to Server-Side Request Forgery in versions up to, and including, 1.7.1057. This is due to insufficient validation of user-supplied URLs in the render_csv_data() function, which can be bypassed by including 'docs.google.com/spreadsheets' in a query parameter, and the subsequent use of these URLs in fopen() calls without blocking internal or private network addresses. This makes it possible for authenticated attackers, with Contributor-level access and above, to make requests to arbitrary URLs and retrieve sensitive information from internal services.

PUBLISHED Reserved 2026-04-13 | Published 2026-05-02 | Updated 2026-05-04 | Assigner Wordfence




HIGH: 7.2CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N

Problem types

CWE-918 Server-Side Request Forgery (SSRF)

Product status

Default status
unaffected

Any version
affected

Timeline

2026-04-13:Vendor Notified
2026-05-01:Disclosed

Credits

Dmitrii Ignatyev finder

References

www.wordfence.com/...-b199-4945-afcc-4f5b85f5f1e8?source=cve

plugins.trac.wordpress.org/...ble/widgets/wpr-data-table.php

plugins.trac.wordpress.org/...ble/widgets/wpr-data-table.php

plugins.trac.wordpress.org/...ble/widgets/wpr-data-table.php

plugins.trac.wordpress.org/...ble/widgets/wpr-data-table.php

plugins.trac.wordpress.org/...ble/widgets/wpr-data-table.php

plugins.trac.wordpress.org/...ble/widgets/wpr-data-table.php

plugins.trac.wordpress.org/...ble/widgets/wpr-data-table.php

plugins.trac.wordpress.org/...ble/widgets/wpr-data-table.php

plugins.trac.wordpress.org/...r-addons&sfp_email=&sfph_mail=

cve.org (CVE-2026-6229)

nvd.nist.gov (CVE-2026-6229)

Download JSON