Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11363: CWE-434 Unrestricted Upload of File with Dangerous Type in Royal Addons for Elementor

0
Medium
VulnerabilityCVE-2025-11363cvecve-2025-11363cwe-434
Published: Mon Dec 15 2025 (12/15/2025, 06:00:03 UTC)
Source: CVE Database V5
Product: Royal Addons for Elementor

Description

The Royal Addons for Elementor WordPress plugin before 1.7.1037 does not have proper authorisation, allowing unauthenticated users to upload media files via the wpr_addons_upload_file action.

AI-Powered Analysis

AILast updated: 12/15/2025, 06:31:06 UTC

Technical Analysis

CVE-2025-11363 is a security vulnerability classified under CWE-434 (Unrestricted Upload of File with Dangerous Type) affecting the Royal Addons for Elementor WordPress plugin prior to version 1.7.1037. The vulnerability arises due to insufficient authorization checks on the wpr_addons_upload_file action, which allows unauthenticated users to upload media files without restriction. This means an attacker can upload arbitrary files, including potentially malicious scripts or web shells, directly to the server hosting the WordPress site. Such files could be used to execute remote code, deface websites, steal sensitive data, or pivot to further internal network compromise. The vulnerability does not require any authentication or user interaction, making it highly exploitable, especially by automated bots scanning for vulnerable WordPress instances. Although no public exploits are currently known, the nature of the vulnerability and the popularity of the affected plugin increase the likelihood of future exploitation. The absence of a CVSS score requires an assessment based on impact and exploitability factors. The vulnerability impacts confidentiality, integrity, and availability by enabling unauthorized file uploads that can lead to remote code execution or data breaches. The scope is broad, as any site running the affected plugin version is vulnerable. The plugin is widely used in WordPress environments, which are prevalent across many European organizations for web content management and e-commerce. The vulnerability's publication date is December 15, 2025, with the issue reserved in early October 2025, indicating recent discovery and disclosure. No patch links are currently available, emphasizing the need for vigilance and interim mitigations.

Potential Impact

For European organizations, this vulnerability poses a significant risk to website security and data integrity. Organizations relying on WordPress with the Royal Addons for Elementor plugin could face unauthorized website defacement, data leakage, or complete server compromise if attackers upload and execute malicious files. This can lead to reputational damage, loss of customer trust, regulatory penalties under GDPR if personal data is exposed, and operational disruptions. Automated exploitation attempts could increase, targeting vulnerable sites across Europe. The impact is especially critical for sectors with high web exposure such as e-commerce, media, and public institutions. Additionally, compromised websites could be used as launchpads for further attacks within corporate networks or for distributing malware to visitors. The lack of authentication requirement lowers the barrier for attackers, increasing the urgency for mitigation. Organizations without timely patching or compensating controls risk severe consequences including data breaches and service outages.

Mitigation Recommendations

1. Immediately monitor for any suspicious file upload activity related to the wpr_addons_upload_file action in web server logs and WordPress logs. 2. Implement web application firewall (WAF) rules to block unauthorized POST requests to the upload endpoint or restrict upload file types to safe extensions. 3. Disable or restrict the Royal Addons for Elementor plugin if patching is not yet available, especially on public-facing sites. 4. Enforce strict file upload validation and sanitization policies at the application and server level, including MIME type checks and file content inspection. 5. Regularly audit installed WordPress plugins and update them promptly once a patch for this vulnerability is released. 6. Employ intrusion detection systems (IDS) to detect anomalous upload behavior or web shell signatures. 7. Limit permissions on upload directories to prevent execution of uploaded files. 8. Educate site administrators about this vulnerability and encourage immediate action to reduce exposure. 9. Consider isolating WordPress instances in segmented network zones to limit lateral movement if compromise occurs.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
WPScan
Date Reserved
2025-10-06T12:38:04.177Z
Cvss Version
null
State
PUBLISHED

Threat ID: 693fa76fd9bcdf3f3db90008

Added to database: 12/15/2025, 6:15:11 AM

Last enriched: 12/15/2025, 6:31:06 AM

Last updated: 12/15/2025, 5:23:36 PM

Views: 20

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats