CVE-2025-68494

7.5 HIGH

📋 TL;DR

This vulnerability in Premium Addons for Elementor WordPress plugin allows unauthorized users to retrieve embedded sensitive data from affected websites. It affects all WordPress sites using Premium Addons for Elementor version 4.11.53 or earlier. The exposure occurs through improper access controls in the plugin's functionality.

💻 Affected Systems

Products:
  • Premium Addons for Elementor WordPress Plugin
Versions: <= 4.11.53
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Affects WordPress installations with the Premium Addons for Elementor plugin installed and activated.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could extract sensitive information such as API keys, database credentials, configuration secrets, or user data embedded in plugin components, potentially leading to full site compromise.

🟠

Likely Case

Unauthenticated attackers accessing exposed endpoints to retrieve configuration data, plugin settings, or embedded credentials that could facilitate further attacks.

🟢

If Mitigated

With proper web application firewalls and access controls, the exposure would be limited to non-critical information with minimal impact.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability involves accessing specific endpoints without authentication. Exploitation requires knowledge of vulnerable endpoints but is technically simple.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.11.54 or later

Vendor Advisory: https://patchstack.com/database/Wordpress/Plugin/premium-addons-for-elementor/vulnerability/wordpress-premium-addons-for-elementor-plugin-4-11-53-sensitive-data-exposure-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel
2. Navigate to Plugins → Installed Plugins
3. Find 'Premium Addons for Elementor'
4. Click 'Update Now' if available
5. If no update shows, download version 4.11.54+ from WordPress.org
6. Deactivate old plugin, upload new version, activate

🔧 Temporary Workarounds

Temporary Plugin Deactivation

all

Disable the vulnerable plugin until patched

wp plugin deactivate premium-addons-for-elementor

Web Application Firewall Rule

linux

Block access to vulnerable plugin endpoints

# Add to .htaccess for Apache:
RewriteRule ^wp-content/plugins/premium-addons-for-elementor/.*\.php$ - [F,L]
# Add to nginx config:
location ~* ^/wp-content/plugins/premium-addons-for-elementor/.*\.php$ { deny all; }

🧯 If You Can't Patch

  • Remove the Premium Addons for Elementor plugin completely from the WordPress installation
  • Implement strict network access controls to limit who can access the WordPress site

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Premium Addons for Elementor → Version. If version is 4.11.53 or lower, you are vulnerable.

Check Version:

wp plugin get premium-addons-for-elementor --field=version

Verify Fix Applied:

After updating, verify the plugin version shows 4.11.54 or higher in WordPress admin.

📡 Detection & Monitoring

Log Indicators:

  • Unusual access patterns to /wp-content/plugins/premium-addons-for-elementor/ endpoints
  • Multiple 200 responses to plugin-specific URLs from unauthenticated users

Network Indicators:

  • HTTP requests to premium-addons-for-elementor plugin directories without authentication
  • Unusual data extraction patterns from plugin endpoints

SIEM Query:

source="web_logs" AND (uri="/wp-content/plugins/premium-addons-for-elementor/*" OR user_agent="*premium-addons*" OR referer="*premium-addons*") AND status=200 AND auth="-"

🔗 References

📤 Share & Export