Description
The Royal Elementor Addons plugin for WordPress is vulnerable to Server-Side Request Forgery in versions up to, and including, 1.7.1057. This is due to insufficient validation of user-supplied URLs in the render_csv_data() function, which can be bypassed by including 'docs.google.com/spreadsheets' in a query parameter, and the subsequent use of these URLs in fopen() calls without blocking internal or private network addresses. This makes it possible for authenticated attackers, with Contributor-level access and above, to make requests to arbitrary URLs and retrieve sensitive information from internal services.
Problem types
CWE-918 Server-Side Request Forgery (SSRF)
Product status
Any version
Timeline
| 2026-04-13: | Vendor Notified |
| 2026-05-01: | Disclosed |
Credits
Dmitrii Ignatyev
References
www.wordfence.com/...-b199-4945-afcc-4f5b85f5f1e8?source=cve
plugins.trac.wordpress.org/...ble/widgets/wpr-data-table.php
plugins.trac.wordpress.org/...ble/widgets/wpr-data-table.php
plugins.trac.wordpress.org/...ble/widgets/wpr-data-table.php
plugins.trac.wordpress.org/...ble/widgets/wpr-data-table.php
plugins.trac.wordpress.org/...ble/widgets/wpr-data-table.php
plugins.trac.wordpress.org/...ble/widgets/wpr-data-table.php
plugins.trac.wordpress.org/...ble/widgets/wpr-data-table.php
plugins.trac.wordpress.org/...ble/widgets/wpr-data-table.php
plugins.trac.wordpress.org/...r-addons&sfp_email=&sfph_mail=