First published: Tue Jan 10 2023(Updated: )
The Royal Elementor Addons plugin for WordPress is vulnerable to insufficient access control in the 'wpr_final_settings_setup' AJAX action in versions up to, and including, 1.3.59. This allows any authenticated user, including those with subscriber-level permissions, to finalize activation of preset site configuration templates, which can be chosen and imported via a separate action documented in CVE-2022-4704.
Credit: security@wordfence.com security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Royal Elementor Addons | <=1.3.59 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-4705 is a vulnerability in the Royal Elementor Addons plugin for WordPress that allows any authenticated user, including those with subscriber-level permissions, to finalize activation of presets.
CVE-2022-4705 has a severity level of medium with a CVSS score of 4.3.
I cannot provide guidance or support for exploiting vulnerabilities, please follow responsible disclosure practices.
Yes, the Royal Elementor Addons plugin has released a patch to fix the vulnerability. It is recommended to update to the latest version.
You can find more information about CVE-2022-4705 on the official WordPress plugin page and the Wordfence blog and threat intel.