CVE-2026-0920

9.8 CRITICAL

📋 TL;DR

The LA-Studio Element Kit for Elementor WordPress plugin allows unauthenticated attackers to create administrator accounts by manipulating the registration process. This affects all versions up to 1.5.6.3. Any WordPress site using this vulnerable plugin is at risk of complete compromise.

💻 Affected Systems

Products:
  • LA-Studio Element Kit for Elementor WordPress plugin
Versions: All versions up to and including 1.5.6.3
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires the plugin to be installed and active with registration functionality enabled.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete site takeover with administrator privileges, allowing data theft, defacement, malware injection, and further network penetration.

🟠

Likely Case

Attackers create administrator accounts to gain persistent access, install backdoors, steal sensitive data, and potentially compromise the entire WordPress installation.

🟢

If Mitigated

With proper monitoring and access controls, unauthorized admin creation would be detected and blocked before significant damage occurs.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple HTTP POST request manipulation with the 'lakit_bkrole' parameter set to administrator role.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.5.6.4 or later

Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3439121/lastudio-element-kit

Restart Required: No

Instructions:

1. Update the LA-Studio Element Kit plugin to version 1.5.6.4 or later via WordPress admin panel. 2. Verify the update completed successfully. 3. Check for any unauthorized administrator accounts and remove them.

🔧 Temporary Workarounds

Disable plugin registration

all

Temporarily disable user registration functionality in the plugin settings if available.

Deactivate vulnerable plugin

all

Completely deactivate the LA-Studio Element Kit plugin until patched.

🧯 If You Can't Patch

  • Implement web application firewall rules to block requests containing 'lakit_bkrole' parameter
  • Enable strict user role assignment monitoring and alerting for new administrator accounts

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > LA-Studio Element Kit version. If version is 1.5.6.3 or lower, you are vulnerable.

Check Version:

wp plugin get lastudio-element-kit --field=version

Verify Fix Applied:

After updating, verify plugin version is 1.5.6.4 or higher and test registration functionality with role manipulation attempts.

📡 Detection & Monitoring

Log Indicators:

  • HTTP POST requests to registration endpoints with 'lakit_bkrole' parameter
  • Unexpected administrator user creation events
  • Failed login attempts from newly created admin accounts

Network Indicators:

  • POST requests to /wp-admin/admin-ajax.php with action=lastudio_kit_register containing role parameters

SIEM Query:

source="wordpress" AND (uri_path="/wp-admin/admin-ajax.php" AND post_data CONTAINS "lastudio_kit_register" AND post_data CONTAINS "lakit_bkrole")

🔗 References

📤 Share & Export