Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-6327: Unrestricted Upload of File with Dangerous Type in KingAddons.com King Addons for Elementor

0
Critical
VulnerabilityCVE-2025-6327cvecve-2025-6327
Published: Thu Nov 06 2025 (11/06/2025, 15:56:06 UTC)
Source: CVE Database V5
Vendor/Project: KingAddons.com
Product: King Addons for Elementor

Description

Unrestricted Upload of File with Dangerous Type vulnerability in KingAddons.com King Addons for Elementor king-addons allows Upload a Web Shell to a Web Server.This issue affects King Addons for Elementor: from n/a through <= 51.1.36.

AI-Powered Analysis

AILast updated: 11/13/2025, 16:26:56 UTC

Technical Analysis

CVE-2025-6327 is an unrestricted file upload vulnerability found in the King Addons for Elementor plugin developed by KingAddons.com. This plugin is widely used to extend the functionality of the Elementor page builder on WordPress websites. The vulnerability allows unauthenticated attackers to upload files of dangerous types, including web shells, directly to the web server without any restrictions or validation. This means an attacker can upload malicious scripts that provide remote code execution capabilities, effectively gaining full control over the affected server. The vulnerability affects all versions up to and including 51.1.36. The CVSS v3.1 base score is 10.0, indicating critical severity, with attack vector network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and scope changed (S:C). The impact on confidentiality, integrity, and availability is high, as attackers can execute arbitrary code, manipulate data, and disrupt services. Although no known exploits are currently reported in the wild, the nature of the vulnerability makes it a prime target for attackers seeking to compromise WordPress sites. The lack of patch links suggests that a fix may not yet be publicly available, increasing the urgency for monitoring and mitigation. This vulnerability is particularly dangerous because WordPress sites are common attack vectors, and plugins like King Addons are popular in the European market. Attackers exploiting this flaw can deploy web shells to maintain persistent access, steal sensitive data, or launch further attacks within the network.

Potential Impact

For European organizations, the impact of CVE-2025-6327 can be severe. Many businesses, government agencies, and service providers rely on WordPress and Elementor with King Addons for their web presence. Successful exploitation can lead to complete server compromise, resulting in data breaches, defacement, ransomware deployment, or use of compromised servers as pivot points for lateral movement within corporate networks. This can cause significant financial losses, reputational damage, and regulatory penalties under GDPR due to unauthorized data access. The critical nature of the vulnerability means that even small or medium enterprises with limited cybersecurity resources are at risk. Additionally, public sector websites in Europe, which often use WordPress for content management, could be targeted for disruption or espionage. The lack of authentication and user interaction requirements lowers the barrier for attackers, increasing the likelihood of automated exploitation attempts. The potential for scope change means that the vulnerability could affect other components or services running on the same server, amplifying the damage.

Mitigation Recommendations

1. Immediate monitoring for any suspicious file uploads or web shell indicators on servers running King Addons for Elementor. 2. Apply patches or updates from KingAddons.com as soon as they become available; if no official patch exists, consider disabling or removing the plugin temporarily. 3. Implement strict server-side validation to restrict allowed file types and enforce file size limits on uploads. 4. Use web application firewalls (WAFs) with rules to detect and block malicious upload attempts targeting this vulnerability. 5. Restrict file upload directories with proper permissions to prevent execution of uploaded files. 6. Conduct regular security audits and vulnerability scans focusing on WordPress plugins and themes. 7. Employ intrusion detection systems (IDS) to alert on anomalous activities related to file uploads. 8. Educate web administrators on the risks of unrestricted file uploads and best practices for plugin management. 9. Consider isolating web servers in segmented network zones to limit lateral movement if compromise occurs. 10. Backup website data and configurations regularly to enable rapid recovery in case of compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-06-19T10:04:36.817Z
Cvss Version
null
State
PUBLISHED

Threat ID: 690cc81eca26fb4dd2f59cfa

Added to database: 11/6/2025, 4:09:02 PM

Last enriched: 11/13/2025, 4:26:56 PM

Last updated: 12/21/2025, 9:23:29 PM

Views: 193

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats