CVE-2025-10873: CWE-862 Missing Authorization in ElementInvader Addons for Elementor
The ElementInvader Addons for Elementor WordPress plugin before 1.4.1 allows unauthenticated user to send arbitrary e-mails to arbitrary addresses due to missing authorization on the elementinvader_addons_for_elementor_forms_send_form action.
AI Analysis
Technical Summary
CVE-2025-10873 identifies a missing authorization vulnerability (CWE-862) in the ElementInvader Addons for Elementor WordPress plugin prior to version 1.4.1. The vulnerability stems from the lack of proper access control on the 'elementinvader_addons_for_elementor_forms_send_form' action, which handles form submissions for sending emails. Because the plugin does not verify whether the requestor is authorized, unauthenticated attackers can invoke this action to send arbitrary emails to arbitrary recipients. This can be leveraged to conduct spam campaigns, phishing attacks, or to damage the reputation of the affected website by sending malicious or misleading emails appearing to originate from a trusted domain. The vulnerability does not require authentication or user interaction, making it straightforward to exploit remotely. Although no public exploits have been reported yet, the flaw's nature suggests it could be weaponized quickly once discovered. The affected product is a popular addon for Elementor, a widely used WordPress page builder, increasing the potential attack surface. The vulnerability was reserved in September 2025 and published in November 2025, but no patch links are currently available, indicating that remediation may still be pending or in progress.
Potential Impact
For European organizations, this vulnerability can lead to significant risks including unauthorized email sending that may facilitate phishing, spam distribution, and social engineering attacks targeting employees, customers, or partners. This can result in loss of customer trust, brand damage, and potential regulatory consequences under GDPR if personal data is exposed or misused. The ability to send arbitrary emails without authentication undermines the integrity and confidentiality of communications originating from affected websites. Additionally, organizations may face blacklisting of their email domains or IP addresses due to spam activities, impacting legitimate email deliverability. The vulnerability's ease of exploitation and lack of required user interaction increase the likelihood of widespread abuse. Organizations relying on WordPress sites with the vulnerable plugin, especially those in sectors like e-commerce, finance, and public services, are at heightened risk due to the critical nature of their communications and data.
Mitigation Recommendations
Immediate mitigation involves updating the ElementInvader Addons for Elementor plugin to version 1.4.1 or later once it becomes available, as this version is expected to include proper authorization checks. Until an official patch is released, organizations should consider implementing custom access control measures such as restricting access to the vulnerable action via web application firewalls (WAFs) or server-side rules that block unauthenticated requests to the 'elementinvader_addons_for_elementor_forms_send_form' endpoint. Monitoring outgoing email traffic for unusual patterns can help detect exploitation attempts early. Additionally, organizations should audit their WordPress installations to identify the presence of this plugin and disable or remove it if not essential. Employing email authentication standards like SPF, DKIM, and DMARC can reduce the impact of spoofed emails sent through this vulnerability. Regular security assessments and plugin inventory management will help prevent similar risks in the future.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain
CVE-2025-10873: CWE-862 Missing Authorization in ElementInvader Addons for Elementor
Description
The ElementInvader Addons for Elementor WordPress plugin before 1.4.1 allows unauthenticated user to send arbitrary e-mails to arbitrary addresses due to missing authorization on the elementinvader_addons_for_elementor_forms_send_form action.
AI-Powered Analysis
Technical Analysis
CVE-2025-10873 identifies a missing authorization vulnerability (CWE-862) in the ElementInvader Addons for Elementor WordPress plugin prior to version 1.4.1. The vulnerability stems from the lack of proper access control on the 'elementinvader_addons_for_elementor_forms_send_form' action, which handles form submissions for sending emails. Because the plugin does not verify whether the requestor is authorized, unauthenticated attackers can invoke this action to send arbitrary emails to arbitrary recipients. This can be leveraged to conduct spam campaigns, phishing attacks, or to damage the reputation of the affected website by sending malicious or misleading emails appearing to originate from a trusted domain. The vulnerability does not require authentication or user interaction, making it straightforward to exploit remotely. Although no public exploits have been reported yet, the flaw's nature suggests it could be weaponized quickly once discovered. The affected product is a popular addon for Elementor, a widely used WordPress page builder, increasing the potential attack surface. The vulnerability was reserved in September 2025 and published in November 2025, but no patch links are currently available, indicating that remediation may still be pending or in progress.
Potential Impact
For European organizations, this vulnerability can lead to significant risks including unauthorized email sending that may facilitate phishing, spam distribution, and social engineering attacks targeting employees, customers, or partners. This can result in loss of customer trust, brand damage, and potential regulatory consequences under GDPR if personal data is exposed or misused. The ability to send arbitrary emails without authentication undermines the integrity and confidentiality of communications originating from affected websites. Additionally, organizations may face blacklisting of their email domains or IP addresses due to spam activities, impacting legitimate email deliverability. The vulnerability's ease of exploitation and lack of required user interaction increase the likelihood of widespread abuse. Organizations relying on WordPress sites with the vulnerable plugin, especially those in sectors like e-commerce, finance, and public services, are at heightened risk due to the critical nature of their communications and data.
Mitigation Recommendations
Immediate mitigation involves updating the ElementInvader Addons for Elementor plugin to version 1.4.1 or later once it becomes available, as this version is expected to include proper authorization checks. Until an official patch is released, organizations should consider implementing custom access control measures such as restricting access to the vulnerable action via web application firewalls (WAFs) or server-side rules that block unauthenticated requests to the 'elementinvader_addons_for_elementor_forms_send_form' endpoint. Monitoring outgoing email traffic for unusual patterns can help detect exploitation attempts early. Additionally, organizations should audit their WordPress installations to identify the presence of this plugin and disable or remove it if not essential. Employing email authentication standards like SPF, DKIM, and DMARC can reduce the impact of spoofed emails sent through this vulnerability. Regular security assessments and plugin inventory management will help prevent similar risks in the future.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- WPScan
- Date Reserved
- 2025-09-23T12:21:49.391Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 690aea9b063e7c5f0116da77
Added to database: 11/5/2025, 6:11:39 AM
Last enriched: 11/5/2025, 6:12:26 AM
Last updated: 11/5/2025, 1:56:20 PM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-12497: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in averta Premium Portfolio Features for Phlox theme
HighCVE-2025-11745: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in spacetime Ad Inserter – Ad Manager & AdSense Ads
MediumCVE-2025-58337: CWE-284 Improper Access Control in Apache Software Foundation Apache Doris-MCP-Server
UnknownCVE-2025-12469: CWE-862 Missing Authorization in amans2k FunnelKit Automations – Email Marketing Automation and CRM for WordPress & WooCommerce
MediumCVE-2025-12468: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in amans2k FunnelKit Automations – Email Marketing Automation and CRM for WordPress & WooCommerce
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.