CVE-2025-14163

4.3 MEDIUM

📋 TL;DR

This CSRF vulnerability in the Premium Addons for Elementor WordPress plugin allows unauthenticated attackers to create arbitrary Elementor templates by tricking administrators into clicking malicious links. All WordPress sites using this plugin up to version 4.11.53 are affected. Attackers can inject malicious templates that could lead to further compromise.

💻 Affected Systems

Products:
  • Premium Addons for Elementor WordPress plugin
Versions: All versions up to and including 4.11.53
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress with Elementor and the Premium Addons plugin installed. The vulnerability is present in default configurations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers create malicious templates containing JavaScript payloads that execute when viewed, potentially leading to site takeover, data theft, or malware distribution to visitors.

🟠

Likely Case

Attackers inject spam content, redirects, or defacement templates that appear on the website, damaging reputation and SEO.

🟢

If Mitigated

With proper CSRF protections and user awareness, exploitation requires social engineering that may be detected before damage occurs.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires social engineering to trick administrators, but the technical complexity is low once the victim interacts with the malicious link.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.11.54 or later

Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3416254/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'Premium Addons for Elementor'. 4. Click 'Update Now' if available. 5. Alternatively, download version 4.11.54+ from WordPress.org and manually update.

🔧 Temporary Workarounds

Disable vulnerable function via filter

all

Add WordPress filter to disable the vulnerable insert_inner_template function

Add to theme's functions.php or custom plugin: add_filter('premium_addons_elementor_templates_enabled', '__return_false');

🧯 If You Can't Patch

  • Temporarily deactivate the Premium Addons for Elementor plugin until patched
  • Implement strict Content Security Policy (CSP) headers to limit script execution from unauthorized sources

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin > Plugins > Installed Plugins for Premium Addons for Elementor version. If version is 4.11.53 or lower, you are vulnerable.

Check Version:

wp plugin get premium-addons-for-elementor --field=version (if WP-CLI installed)

Verify Fix Applied:

After updating, verify the plugin version shows 4.11.54 or higher in WordPress admin.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /wp-admin/admin-ajax.php with action=premium_inner_template_insert
  • Multiple template creation events from single user sessions
  • Administrator accounts creating templates shortly after clicking external links

Network Indicators:

  • Outbound calls to suspicious domains in newly created templates
  • Unexpected iframe or script injections in template content

SIEM Query:

source="wordpress.log" AND "premium_inner_template_insert" AND status=200

🔗 References

📤 Share & Export