Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-0968: CWE-284 Improper Access Control in xpeedstudio ElementsKit Elementor addons

0
Medium
VulnerabilityCVE-2025-0968cvecve-2025-0968cwe-284
Published: Wed Feb 19 2025 (02/19/2025, 11:10:39 UTC)
Source: CVE Database V5
Vendor/Project: xpeedstudio
Product: ElementsKit Elementor addons

Description

CVE-2025-0968 is a medium-severity vulnerability in the ElementsKit Elementor addons WordPress plugin that allows unauthenticated attackers to access sensitive information. Due to missing capability checks in the get_megamenu_content() function, attackers can view any Elementor-created content including posts, pages, templates, drafts, trashed, and private items. The vulnerability affects all versions up to and including 3. 4. 0. Exploitation requires no authentication or user interaction and can be performed remotely over the network. Although no known exploits are currently in the wild, the exposure of sensitive content can lead to information disclosure risks. Organizations using this plugin should prioritize patching or applying mitigations to prevent unauthorized data access. The CVSS score is 5. 3, reflecting a moderate impact on confidentiality with no impact on integrity or availability.

AI-Powered Analysis

AILast updated: 02/26/2026, 00:00:12 UTC

Technical Analysis

CVE-2025-0968 is a vulnerability classified under CWE-284 (Improper Access Control) affecting the ElementsKit Elementor addons plugin for WordPress. The root cause is the absence of proper capability checks in the get_megamenu_content() function, which is responsible for retrieving menu content created via Elementor. This flaw allows unauthenticated remote attackers to bypass access controls and retrieve any Elementor content, including sensitive drafts, trashed items, and private pages or templates that should normally be restricted. The vulnerability impacts all versions of the plugin up to and including 3.4.0. Since the attack vector is network-based and requires no privileges or user interaction, it is relatively easy to exploit. The exposure of sensitive content can lead to information leakage, potentially aiding further attacks such as social engineering or reconnaissance. No known public exploits have been reported yet, but the vulnerability is publicly disclosed and assigned CVE-2025-0968 with a CVSS v3.1 base score of 5.3, indicating a medium severity level. The vulnerability specifically compromises confidentiality but does not affect integrity or availability of the system. The plugin is widely used in WordPress sites that utilize Elementor for page building, making a broad range of websites potentially vulnerable until patched.

Potential Impact

The primary impact of CVE-2025-0968 is the unauthorized disclosure of sensitive information stored within Elementor-created content on WordPress sites using the ElementsKit addon. This includes access to unpublished drafts, private pages, trashed items, and templates that may contain confidential business information, intellectual property, or personal data. Such exposure can facilitate further attacks like targeted phishing, social engineering, or reconnaissance by adversaries. While the vulnerability does not allow modification or deletion of content, the breach of confidentiality can damage organizational reputation and violate data privacy regulations. Since the vulnerability requires no authentication and can be exploited remotely, any affected website is at risk of data leakage. Organizations relying on this plugin for their web presence, especially those hosting sensitive or proprietary content, face increased risk until remediation is applied. The medium CVSS score reflects moderate risk, but the ease of exploitation and scope of affected sites could lead to widespread information exposure.

Mitigation Recommendations

To mitigate CVE-2025-0968, organizations should immediately update the ElementsKit Elementor addons plugin to a version that includes proper capability checks once released by the vendor. Until an official patch is available, administrators can implement the following specific measures: 1) Restrict access to the get_megamenu_content() endpoint by configuring web application firewalls (WAF) or server rules to block unauthenticated requests targeting this function. 2) Limit plugin usage to trusted administrators and disable or remove the plugin if it is not essential. 3) Harden WordPress security by enforcing strict user role permissions and monitoring access logs for suspicious requests to Elementor-related endpoints. 4) Employ content access control plugins that provide additional layers of authorization checks beyond the vulnerable plugin. 5) Regularly audit website content visibility settings to ensure sensitive drafts or private pages are not inadvertently exposed. 6) Monitor threat intelligence sources for any emerging exploits and apply patches promptly. These targeted mitigations go beyond generic advice by focusing on access control enforcement and minimizing attack surface until the vendor patch is available.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-02-01T21:47:17.502Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6b6eb7ef31ef0b555627

Added to database: 2/25/2026, 9:36:46 PM

Last enriched: 2/26/2026, 12:00:12 AM

Last updated: 2/26/2026, 7:14:30 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats