CVE-2025-0968
📋 TL;DR
The ElementsKit Elementor addons plugin for WordPress has an information disclosure vulnerability that allows unauthenticated attackers to view any content created in Elementor, including private posts, drafts, and trashed items. This affects all WordPress sites using ElementsKit Lite plugin versions up to 3.4.0.
💻 Affected Systems
- ElementsKit Lite (WordPress plugin)
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Attackers could access sensitive unpublished content, proprietary information, draft posts containing credentials, or private business documents before official publication.
Likely Case
Unauthenticated users can view draft posts, private pages, and unpublished templates, potentially exposing sensitive information or proprietary content.
If Mitigated
With proper access controls and monitoring, impact is limited to information exposure without modification or deletion capabilities.
🎯 Exploit Status
Simple HTTP request to vulnerable endpoint without authentication required.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 3.4.1
Vendor Advisory: https://wordpress.org/plugins/elementskit-lite/#developers
Restart Required: No
Instructions:
1. Log into WordPress admin panel
2. Navigate to Plugins → Installed Plugins
3. Find ElementsKit Lite
4. Click 'Update Now' if available
5. Or download version 3.4.1+ from WordPress repository
6. Deactivate and delete old version
7. Upload and activate new version
🔧 Temporary Workarounds
Disable vulnerable endpoint via .htaccess
linuxBlock access to the vulnerable API endpoint
RewriteEngine On
RewriteRule ^wp-content/plugins/elementskit-lite/modules/megamenu/api\.php$ - [F,L]
Temporarily disable plugin
allDeactivate ElementsKit Lite plugin until patched
wp plugin deactivate elementskit-lite
🧯 If You Can't Patch
- Implement web application firewall (WAF) rules to block requests to /wp-content/plugins/elementskit-lite/modules/megamenu/api.php
- Restrict access to WordPress admin area using IP whitelisting or authentication gateways
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin → Plugins → ElementsKit Lite version. If version ≤3.4.0, vulnerable.
Check Version:
wp plugin get elementskit-lite --field=version
Verify Fix Applied:
After update, confirm version is 3.4.1+ in WordPress admin panel.
📡 Detection & Monitoring
Log Indicators:
- HTTP GET requests to /wp-content/plugins/elementskit-lite/modules/megamenu/api.php with post_id parameter
Network Indicators:
- Unusual traffic to plugin API endpoint from unauthenticated sources
SIEM Query:
source="web_logs" AND uri="/wp-content/plugins/elementskit-lite/modules/megamenu/api.php" AND method="GET"
🔗 References
- https://plugins.trac.wordpress.org/browser/elementskit-lite/trunk/modules/megamenu/api.php#L47
- https://plugins.trac.wordpress.org/changeset/3237243/
- https://wordpress.org/plugins/elementskit-lite/#developers
- https://www.wordfence.com/threat-intel/vulnerabilities/id/432ac3b1-8f1d-442f-8e8d-62a1f26ba259?source=cve