First published: Tue Jan 10 2023(Updated: )
The Royal Elementor Addons plugin for WordPress is vulnerable to insufficient access control in the 'wpr_fix_royal_compatibility' AJAX action in versions up to, and including, 1.3.59. This allows any authenticated user, including those with subscriber-level permissions, to deactivate every plugin on the site unless it is part of an extremely limited hardcoded selection. This also switches the site to the 'royal-elementor-kit' theme, potentially resulting in availability issues.
Credit: security@wordfence.com security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Royal Elementor Addons | <=1.3.59 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-4702 is a vulnerability in the Royal Elementor Addons plugin for WordPress that allows any authenticated user, including those with subscriber-level permissions, to deactivate every plugin on the site.
CVE-2022-4702 has a severity rating of 6.5, which is considered medium.
An attacker can exploit the CVE-2022-4702 vulnerability by sending malicious requests to the 'wpr_fix_royal_compatibility' AJAX action in the Royal Elementor Addons plugin.
To fix the CVE-2022-4702 vulnerability, update the Royal Elementor Addons plugin to version 1.3.60 or later.
Yes, you can find more information about CVE-2022-4702 at the following references: [Reference 1](https://plugins.trac.wordpress.org/browser/royal-elementor-addons/trunk/admin/templates-kit.php?rev=2833046), [Reference 2](https://www.wordfence.com/blog/2023/01/eleven-vulnerabilities-patched-in-royal-elementor-addons/), [Reference 3](https://www.wordfence.com/threat-intel/vulnerabilities/id/cb47b6cc-87e4-4d29-bbc7-6d7552bc3943)