Skip to main content

CVE-2023-5922: CWE-639 Authorization Bypass Through User-Controlled Key in Unknown Royal Elementor Addons and Templates

High
VulnerabilityCVE-2023-5922cvecve-2023-5922cwe-639
Published: Tue Jan 16 2024 (01/16/2024, 15:57:21 UTC)
Source: CVE Database V5
Vendor/Project: Unknown
Product: Royal Elementor Addons and Templates

Description

The Royal Elementor Addons and Templates WordPress plugin before 1.3.81 does not ensure that users accessing posts via an AJAX action (and REST endpoint, currently disabled in the plugin) have the right to do so, allowing unauthenticated users to access arbitrary draft, private and password protected posts/pages content

AI-Powered Analysis

AILast updated: 07/03/2025, 17:01:55 UTC

Technical Analysis

CVE-2023-5922 is a high-severity authorization bypass vulnerability affecting the WordPress plugin 'Royal Elementor Addons and Templates' in versions prior to 1.3.81. The vulnerability arises because the plugin fails to properly verify user permissions when handling requests to access posts via an AJAX action. Specifically, unauthenticated users can exploit this flaw to retrieve content from draft, private, or password-protected posts and pages. Although the REST API endpoint related to this functionality is currently disabled in the plugin, the AJAX endpoint remains vulnerable. The root cause is classified under CWE-639, which involves authorization bypass through user-controlled keys, indicating that the plugin does not adequately restrict access based on user privileges. The CVSS v3.1 base score is 7.5, reflecting a network attack vector with low complexity, no privileges required, and no user interaction needed. The impact is limited to confidentiality, as attackers can read sensitive unpublished or restricted content without altering or disrupting the system. No known exploits have been reported in the wild yet, but the vulnerability poses a significant risk to websites using this plugin, especially those hosting sensitive or proprietary content in draft or private states. Since the plugin is integrated with WordPress, a widely used content management system, the attack surface is broad, particularly for sites relying on Royal Elementor Addons and Templates for content presentation and management.

Potential Impact

For European organizations, this vulnerability could lead to unauthorized disclosure of sensitive internal content, including unpublished articles, confidential project details, or proprietary information stored as draft or private posts. This exposure can damage organizational reputation, violate data protection regulations such as GDPR by leaking personal or sensitive data, and potentially provide attackers with intelligence for further targeted attacks. Organizations in sectors like media, government, education, and enterprises using WordPress for internal or external communication are particularly at risk. The breach of confidentiality could also undermine trust with customers and partners. Although the vulnerability does not allow modification or disruption of content, the unauthorized access alone can have serious compliance and operational consequences.

Mitigation Recommendations

European organizations using the Royal Elementor Addons and Templates plugin should immediately update to version 1.3.81 or later, where this vulnerability is fixed. If updating is not immediately possible, temporarily disabling the plugin or the vulnerable AJAX actions can reduce risk. Additionally, organizations should audit their WordPress installations to identify any instances of this plugin and verify that no sensitive content is exposed via draft or private posts. Implementing strict access controls and monitoring for unusual AJAX requests targeting post content can help detect exploitation attempts. Web Application Firewalls (WAFs) can be configured to block suspicious requests to the AJAX endpoints associated with this plugin. Regular security assessments and plugin inventory management are recommended to prevent similar issues. Finally, organizations should educate content creators about the risks of storing sensitive information in draft or private posts without additional protections.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
WPScan
Date Reserved
2023-11-02T12:25:01.538Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 683dbfa6182aa0cae24982d0

Added to database: 6/2/2025, 3:13:42 PM

Last enriched: 7/3/2025, 5:01:55 PM

Last updated: 8/11/2025, 9:53:16 PM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats