CVE-2025-62889: Missing Authorization in KingAddons.com King Addons for Elementor
Missing Authorization vulnerability in KingAddons.com King Addons for Elementor king-addons allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects King Addons for Elementor: from n/a through <= 51.1.37.
AI Analysis
Technical Summary
CVE-2025-62889 identifies a missing authorization vulnerability in the KingAddons.com King Addons for Elementor WordPress plugin, affecting all versions up to and including 51.1.37. This vulnerability stems from incorrectly configured access control security levels, allowing attackers with low privileges (PR:L) to bypass authorization checks and perform unauthorized actions remotely (AV:N) without requiring user interaction (UI:N). The vulnerability impacts confidentiality, integrity, and availability (C:H/I:H/A:H) of the affected systems. King Addons is a popular plugin that extends Elementor, a widely used WordPress page builder, enabling enhanced design and functionality. The missing authorization means that certain plugin functions or administrative features can be accessed or manipulated by unauthorized users, potentially leading to site defacement, data leakage, privilege escalation, or denial of service. Although no public exploits are currently known, the vulnerability’s nature and high CVSS score indicate a significant risk. The vulnerability was reserved on 2025-10-24 and published on 2025-10-27, with no patch links currently available, suggesting that organizations must monitor for updates and apply them promptly once released. The vulnerability affects WordPress sites using King Addons for Elementor, which are common in small to medium enterprises and digital agencies. Attackers could leverage this flaw to compromise websites, steal sensitive data, or disrupt services.
Potential Impact
For European organizations, this vulnerability poses a substantial risk due to the widespread use of WordPress and Elementor-based websites across various sectors including e-commerce, media, and professional services. Exploitation could lead to unauthorized data access, defacement, or complete site takeover, damaging brand reputation and causing operational disruptions. Confidential customer data or intellectual property could be exposed, leading to regulatory non-compliance under GDPR and potential financial penalties. The ease of remote exploitation without user interaction increases the threat level, especially for organizations with limited internal network segmentation or weak access controls on their WordPress administrative interfaces. Additionally, organizations relying on King Addons for critical customer-facing portals or internal tools may face significant availability impacts. The absence of known exploits currently provides a window for proactive mitigation, but the high severity score demands urgent attention.
Mitigation Recommendations
Organizations should immediately inventory their WordPress environments to identify installations of King Addons for Elementor and determine affected versions. Until a vendor patch is released, restrict access to WordPress administrative and plugin-specific endpoints using network-level controls such as IP whitelisting, VPN access, or web application firewalls (WAF) with custom rules to block unauthorized requests. Implement strict role-based access controls within WordPress to minimize privileges assigned to users. Monitor web server and application logs for unusual access patterns targeting King Addons endpoints. Regularly check for vendor updates and apply patches promptly once available. Consider deploying runtime application self-protection (RASP) solutions or endpoint detection and response (EDR) tools to detect exploitation attempts. Additionally, conduct security awareness training for administrators to recognize suspicious activity. For high-risk environments, consider temporarily disabling the plugin if feasible until a fix is applied.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain
CVE-2025-62889: Missing Authorization in KingAddons.com King Addons for Elementor
Description
Missing Authorization vulnerability in KingAddons.com King Addons for Elementor king-addons allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects King Addons for Elementor: from n/a through <= 51.1.37.
AI-Powered Analysis
Technical Analysis
CVE-2025-62889 identifies a missing authorization vulnerability in the KingAddons.com King Addons for Elementor WordPress plugin, affecting all versions up to and including 51.1.37. This vulnerability stems from incorrectly configured access control security levels, allowing attackers with low privileges (PR:L) to bypass authorization checks and perform unauthorized actions remotely (AV:N) without requiring user interaction (UI:N). The vulnerability impacts confidentiality, integrity, and availability (C:H/I:H/A:H) of the affected systems. King Addons is a popular plugin that extends Elementor, a widely used WordPress page builder, enabling enhanced design and functionality. The missing authorization means that certain plugin functions or administrative features can be accessed or manipulated by unauthorized users, potentially leading to site defacement, data leakage, privilege escalation, or denial of service. Although no public exploits are currently known, the vulnerability’s nature and high CVSS score indicate a significant risk. The vulnerability was reserved on 2025-10-24 and published on 2025-10-27, with no patch links currently available, suggesting that organizations must monitor for updates and apply them promptly once released. The vulnerability affects WordPress sites using King Addons for Elementor, which are common in small to medium enterprises and digital agencies. Attackers could leverage this flaw to compromise websites, steal sensitive data, or disrupt services.
Potential Impact
For European organizations, this vulnerability poses a substantial risk due to the widespread use of WordPress and Elementor-based websites across various sectors including e-commerce, media, and professional services. Exploitation could lead to unauthorized data access, defacement, or complete site takeover, damaging brand reputation and causing operational disruptions. Confidential customer data or intellectual property could be exposed, leading to regulatory non-compliance under GDPR and potential financial penalties. The ease of remote exploitation without user interaction increases the threat level, especially for organizations with limited internal network segmentation or weak access controls on their WordPress administrative interfaces. Additionally, organizations relying on King Addons for critical customer-facing portals or internal tools may face significant availability impacts. The absence of known exploits currently provides a window for proactive mitigation, but the high severity score demands urgent attention.
Mitigation Recommendations
Organizations should immediately inventory their WordPress environments to identify installations of King Addons for Elementor and determine affected versions. Until a vendor patch is released, restrict access to WordPress administrative and plugin-specific endpoints using network-level controls such as IP whitelisting, VPN access, or web application firewalls (WAF) with custom rules to block unauthorized requests. Implement strict role-based access controls within WordPress to minimize privileges assigned to users. Monitor web server and application logs for unusual access patterns targeting King Addons endpoints. Regularly check for vendor updates and apply patches promptly once available. Consider deploying runtime application self-protection (RASP) solutions or endpoint detection and response (EDR) tools to detect exploitation attempts. Additionally, conduct security awareness training for administrators to recognize suspicious activity. For high-risk environments, consider temporarily disabling the plugin if feasible until a fix is applied.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-10-24T14:24:07.766Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 68fed02d23a7bbed324acb33
Added to database: 10/27/2025, 1:51:41 AM
Last enriched: 1/20/2026, 10:45:26 PM
Last updated: 2/7/2026, 2:17:03 PM
Views: 206
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2087: SQL Injection in SourceCodester Online Class Record System
MediumCVE-2026-2086: Buffer Overflow in UTT HiPER 810G
HighCVE-2026-2085: Command Injection in D-Link DWR-M921
HighCVE-2026-2084: OS Command Injection in D-Link DIR-823X
HighCVE-2026-2083: SQL Injection in code-projects Social Networking Site
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.