CVE-2025-10873: CWE-862 Missing Authorization in ElementInvader Addons for Elementor
The ElementInvader Addons for Elementor WordPress plugin before 1.4.1 allows unauthenticated user to send arbitrary e-mails to arbitrary addresses due to missing authorization on the elementinvader_addons_for_elementor_forms_send_form action.
AI Analysis
Technical Summary
CVE-2025-10873 is a vulnerability identified in the ElementInvader Addons for Elementor WordPress plugin, affecting all versions prior to 1.4.1. The root cause is a missing authorization check on the WordPress AJAX action 'elementinvader_addons_for_elementor_forms_send_form', which allows unauthenticated users to invoke this action and send arbitrary emails to arbitrary recipients. This vulnerability is categorized under CWE-862 (Missing Authorization), indicating that the plugin fails to verify whether the user has the necessary permissions before processing the email sending request. The vulnerability does not require any authentication or user interaction, making it remotely exploitable by anyone who can reach the affected WordPress site. The CVSS v3.1 base score is 5.3, with vector AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N, indicating network attack vector, low attack complexity, no privileges required, no user interaction, unchanged scope, limited confidentiality impact, and no impact on integrity or availability. The primary risk is that attackers can abuse the email sending functionality to send spam, phishing emails, or conduct social engineering attacks, potentially damaging the reputation of the affected organization and leading to blacklisting of their email domains. There are no known exploits in the wild at the time of publication, but the vulnerability is publicly disclosed and should be addressed promptly. No official patch links were provided, but upgrading to version 1.4.1 or later is recommended. The vulnerability affects WordPress sites using this plugin, which is an addon to the popular Elementor page builder plugin, widely used in Europe for website development.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to the confidentiality and reputation of their email communications. Attackers can exploit the missing authorization to send arbitrary emails from the affected WordPress site without authentication, potentially leading to spam campaigns, phishing attacks, or email spoofing that appear to originate from a trusted domain. This can result in reputational damage, loss of customer trust, and possible blacklisting of the organization's email servers by spam filters. While the vulnerability does not directly impact data integrity or availability, the indirect effects on business operations and customer relations can be significant. Organizations in sectors with high reliance on email communications, such as finance, e-commerce, and public services, may face increased risk. Additionally, regulatory compliance under GDPR may be impacted if the abuse leads to personal data exposure or phishing attacks targeting EU citizens. The lack of known exploits in the wild reduces immediate risk but does not eliminate the potential for future exploitation, especially as the vulnerability is publicly documented.
Mitigation Recommendations
European organizations should immediately verify if their WordPress sites use the ElementInvader Addons for Elementor plugin and identify the version in use. The primary mitigation is to upgrade the plugin to version 1.4.1 or later, where the authorization check has been implemented. If upgrading is not immediately possible, organizations should implement web application firewall (WAF) rules to block or restrict access to the AJAX action 'elementinvader_addons_for_elementor_forms_send_form' from unauthenticated users or untrusted IP addresses. Monitoring outgoing email traffic for unusual patterns or spikes can help detect abuse attempts early. Additionally, organizations should review their email sending policies and SPF, DKIM, and DMARC records to reduce the risk of email spoofing and improve email authentication. Regular security audits of WordPress plugins and strict access controls on administrative interfaces are recommended to prevent similar vulnerabilities. Finally, educating website administrators about the importance of timely plugin updates and monitoring security advisories is critical to maintaining a secure environment.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-10873: CWE-862 Missing Authorization in ElementInvader Addons for Elementor
Description
The ElementInvader Addons for Elementor WordPress plugin before 1.4.1 allows unauthenticated user to send arbitrary e-mails to arbitrary addresses due to missing authorization on the elementinvader_addons_for_elementor_forms_send_form action.
AI-Powered Analysis
Technical Analysis
CVE-2025-10873 is a vulnerability identified in the ElementInvader Addons for Elementor WordPress plugin, affecting all versions prior to 1.4.1. The root cause is a missing authorization check on the WordPress AJAX action 'elementinvader_addons_for_elementor_forms_send_form', which allows unauthenticated users to invoke this action and send arbitrary emails to arbitrary recipients. This vulnerability is categorized under CWE-862 (Missing Authorization), indicating that the plugin fails to verify whether the user has the necessary permissions before processing the email sending request. The vulnerability does not require any authentication or user interaction, making it remotely exploitable by anyone who can reach the affected WordPress site. The CVSS v3.1 base score is 5.3, with vector AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N, indicating network attack vector, low attack complexity, no privileges required, no user interaction, unchanged scope, limited confidentiality impact, and no impact on integrity or availability. The primary risk is that attackers can abuse the email sending functionality to send spam, phishing emails, or conduct social engineering attacks, potentially damaging the reputation of the affected organization and leading to blacklisting of their email domains. There are no known exploits in the wild at the time of publication, but the vulnerability is publicly disclosed and should be addressed promptly. No official patch links were provided, but upgrading to version 1.4.1 or later is recommended. The vulnerability affects WordPress sites using this plugin, which is an addon to the popular Elementor page builder plugin, widely used in Europe for website development.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to the confidentiality and reputation of their email communications. Attackers can exploit the missing authorization to send arbitrary emails from the affected WordPress site without authentication, potentially leading to spam campaigns, phishing attacks, or email spoofing that appear to originate from a trusted domain. This can result in reputational damage, loss of customer trust, and possible blacklisting of the organization's email servers by spam filters. While the vulnerability does not directly impact data integrity or availability, the indirect effects on business operations and customer relations can be significant. Organizations in sectors with high reliance on email communications, such as finance, e-commerce, and public services, may face increased risk. Additionally, regulatory compliance under GDPR may be impacted if the abuse leads to personal data exposure or phishing attacks targeting EU citizens. The lack of known exploits in the wild reduces immediate risk but does not eliminate the potential for future exploitation, especially as the vulnerability is publicly documented.
Mitigation Recommendations
European organizations should immediately verify if their WordPress sites use the ElementInvader Addons for Elementor plugin and identify the version in use. The primary mitigation is to upgrade the plugin to version 1.4.1 or later, where the authorization check has been implemented. If upgrading is not immediately possible, organizations should implement web application firewall (WAF) rules to block or restrict access to the AJAX action 'elementinvader_addons_for_elementor_forms_send_form' from unauthenticated users or untrusted IP addresses. Monitoring outgoing email traffic for unusual patterns or spikes can help detect abuse attempts early. Additionally, organizations should review their email sending policies and SPF, DKIM, and DMARC records to reduce the risk of email spoofing and improve email authentication. Regular security audits of WordPress plugins and strict access controls on administrative interfaces are recommended to prevent similar vulnerabilities. Finally, educating website administrators about the importance of timely plugin updates and monitoring security advisories is critical to maintaining a secure environment.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- WPScan
- Date Reserved
- 2025-09-23T12:21:49.391Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 690aea9b063e7c5f0116da77
Added to database: 11/5/2025, 6:11:39 AM
Last enriched: 11/12/2025, 8:02:26 AM
Last updated: 12/20/2025, 3:56:07 PM
Views: 172
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-7782: CWE-862 Missing Authorization in WP JobHunt
HighCVE-2025-7733: CWE-639 Authorization Bypass Through User-Controlled Key in WP JobHunt
MediumCVE-2025-14298: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in damian-gora FiboSearch – Ajax Search for WooCommerce
MediumCVE-2025-12492: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in ultimatemember Ultimate Member – User Profile, Registration, Login, Member Directory, Content Restriction & Membership Plugin
MediumCVE-2025-13619: CWE-269 Improper Privilege Management in CMSSuperHeroes Flex Store Users
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.