Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-6325: Incorrect Privilege Assignment in KingAddons.com King Addons for Elementor

0
Critical
VulnerabilityCVE-2025-6325cvecve-2025-6325
Published: Thu Nov 06 2025 (11/06/2025, 15:56:05 UTC)
Source: CVE Database V5
Vendor/Project: KingAddons.com
Product: King Addons for Elementor

Description

Incorrect Privilege Assignment vulnerability in KingAddons.com King Addons for Elementor king-addons allows Privilege Escalation.This issue affects King Addons for Elementor: from n/a through <= 51.1.36.

AI-Powered Analysis

AILast updated: 11/13/2025, 16:26:37 UTC

Technical Analysis

CVE-2025-6325 is an Incorrect Privilege Assignment vulnerability found in KingAddons.com King Addons for Elementor, a widely used WordPress plugin that extends Elementor page builder functionality. The vulnerability affects all versions up to and including 51.1.36. It allows an unauthenticated attacker to escalate privileges without requiring user interaction, meaning the attacker can gain higher-level permissions than intended by exploiting improper privilege checks within the plugin. The CVSS 3.1 base score is 9.8, reflecting critical severity with network attack vector, low attack complexity, no privileges required, no user interaction, and high impact on confidentiality, integrity, and availability. This suggests that exploitation could lead to full control over the affected WordPress site, including data theft, site defacement, or deployment of malicious code. Although no known exploits are currently reported in the wild, the critical nature and ease of exploitation make this a significant threat. The vulnerability likely stems from flawed access control logic in the plugin's code that improperly assigns or escalates user privileges. Given the plugin's popularity among WordPress users in Europe and worldwide, the risk of exploitation is substantial once exploit code becomes publicly available. The vulnerability was reserved in June 2025 and published in November 2025, indicating recent discovery and disclosure.

Potential Impact

For European organizations, the impact of CVE-2025-6325 can be severe. Many businesses and institutions rely on WordPress and Elementor for their websites, and King Addons is a popular plugin enhancing Elementor's capabilities. Exploitation could allow attackers to gain administrative access to websites, leading to unauthorized data access, data manipulation, or complete site takeover. This can result in loss of customer trust, regulatory penalties under GDPR due to data breaches, and operational disruptions. Public sector websites, e-commerce platforms, and media outlets are particularly at risk due to their high visibility and sensitive data. The critical severity and ease of exploitation mean attackers can quickly compromise vulnerable sites remotely without authentication or user interaction. This could also serve as a foothold for further attacks within organizational networks. The lack of known exploits currently provides a window for proactive defense, but the threat landscape may rapidly evolve once exploit code is developed.

Mitigation Recommendations

1. Immediate action should be to monitor King Addons plugin updates and apply security patches as soon as they are released by KingAddons.com. 2. Until patches are available, restrict access to WordPress admin interfaces using IP whitelisting or VPNs to limit exposure. 3. Implement Web Application Firewalls (WAFs) with custom rules to detect and block suspicious requests targeting the plugin's endpoints. 4. Conduct thorough audits of user roles and permissions within WordPress to ensure no excessive privileges are assigned. 5. Enable detailed logging and monitor for unusual privilege escalation attempts or unauthorized administrative actions. 6. Consider temporarily disabling the King Addons plugin if feasible, especially on high-value or sensitive sites. 7. Educate site administrators about the vulnerability and encourage prompt reporting of suspicious activity. 8. Use security plugins that can detect and alert on privilege escalation or unauthorized changes. 9. Regularly back up website data and configurations to enable rapid recovery in case of compromise. 10. Coordinate with hosting providers to apply network-level protections and incident response support.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-06-19T10:04:18.974Z
Cvss Version
null
State
PUBLISHED

Threat ID: 690cc81eca26fb4dd2f59cf7

Added to database: 11/6/2025, 4:09:02 PM

Last enriched: 11/13/2025, 4:26:37 PM

Last updated: 12/21/2025, 9:22:59 PM

Views: 215

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats