First published: Thu Feb 13 2025(Updated: )
The DethemeKit For Elementor plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 2.36 via the duplicate_post() function due to insufficient restrictions on which posts can be duplicated. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract data from password protected, private, draft, or scheduled posts that they should not have access to by duplicating the post.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Detheme Dethemekit For Elementor | <2.1.9 | |
DethemeKit for Elementor | <=2.36 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2025-0661 is characterized as a medium level risk due to information exposure vulnerabilities allowing unauthorized data access.
To fix CVE-2025-0661, you should update the DethemeKit For Elementor plugin to version 2.37 or later to ensure proper restrictions on post duplication.
CVE-2025-0661 affects all versions of DethemeKit For Elementor up to and including version 2.36.
Authenticated attackers with Contributor-level access can exploit CVE-2025-0661 due to insufficient restrictions on which posts can be duplicated.
The impact of CVE-2025-0661 includes unauthorized exposure of sensitive information from duplicated posts, which could compromise site security.