Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-6327: Unrestricted Upload of File with Dangerous Type in KingAddons.com King Addons for Elementor

0
Critical
VulnerabilityCVE-2025-6327cvecve-2025-6327
Published: Thu Nov 06 2025 (11/06/2025, 15:56:06 UTC)
Source: CVE Database V5
Vendor/Project: KingAddons.com
Product: King Addons for Elementor

Description

Unrestricted Upload of File with Dangerous Type vulnerability in KingAddons.com King Addons for Elementor king-addons allows Upload a Web Shell to a Web Server.This issue affects King Addons for Elementor: from n/a through <= 51.1.36.

AI-Powered Analysis

AILast updated: 11/06/2025, 16:16:38 UTC

Technical Analysis

CVE-2025-6327 is a critical security vulnerability found in the King Addons for Elementor plugin developed by KingAddons.com. This plugin is widely used to extend the functionality of Elementor, a popular WordPress page builder. The vulnerability allows an attacker to perform an unrestricted upload of files with dangerous types, including web shells, directly to the web server hosting the WordPress site. This occurs because the plugin fails to properly validate or restrict the types of files that can be uploaded through its interface. As a result, an attacker can upload malicious scripts disguised as legitimate files, which can then be executed on the server. This leads to remote code execution (RCE), enabling attackers to take full control over the affected web server, manipulate website content, steal sensitive data, or pivot to other internal systems. The vulnerability affects all versions of King Addons for Elementor up to and including version 51.1.36. No authentication or user interaction is required to exploit this flaw, which significantly increases the risk. Although no known exploits are currently in the wild, the vulnerability is publicly disclosed and thus may attract attackers. The lack of an official patch or mitigation guidance at the time of disclosure further elevates the threat. The vulnerability was reserved in June 2025 and published in November 2025, indicating recent discovery and disclosure. Given the widespread use of Elementor and its add-ons in WordPress sites globally, this vulnerability poses a substantial risk to websites relying on this plugin for enhanced functionality.

Potential Impact

For European organizations, the impact of CVE-2025-6327 can be severe. Organizations using WordPress sites with King Addons for Elementor are at risk of having their web servers compromised through remote code execution. This can lead to unauthorized access to sensitive customer and business data, defacement or disruption of websites, and potential lateral movement within corporate networks. The confidentiality, integrity, and availability of affected systems are all at risk. Given the critical role many European businesses place on their online presence for e-commerce, communications, and services, exploitation could result in financial losses, reputational damage, regulatory penalties (especially under GDPR), and operational disruptions. The ease of exploitation without authentication or user interaction increases the likelihood of attacks, including automated mass scanning and exploitation attempts. Additionally, compromised web servers could be used as launchpads for further attacks or to distribute malware, amplifying the threat landscape for European entities.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should take immediate and specific actions beyond generic advice: 1) Monitor official KingAddons.com channels and Patchstack for the release of a security patch and apply it promptly. 2) Until a patch is available, disable or remove the King Addons for Elementor plugin from all WordPress installations to eliminate the attack vector. 3) Implement strict file upload restrictions at the web server and application level, allowing only safe file types and scanning uploaded files for malicious content. 4) Deploy and configure a Web Application Firewall (WAF) with rules to detect and block attempts to upload web shells or suspicious files. 5) Conduct thorough security audits and integrity checks on existing WordPress sites to detect any signs of compromise or unauthorized file uploads. 6) Harden WordPress installations by limiting user permissions, disabling unnecessary features, and ensuring all other plugins and themes are up to date. 7) Increase monitoring and alerting for unusual web server activity, including unexpected file changes or execution of scripts in upload directories. 8) Educate site administrators on the risks of plugin vulnerabilities and the importance of timely updates and security best practices.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-06-19T10:04:36.817Z
Cvss Version
null
State
PUBLISHED

Threat ID: 690cc81eca26fb4dd2f59cfa

Added to database: 11/6/2025, 4:09:02 PM

Last enriched: 11/6/2025, 4:16:38 PM

Last updated: 11/6/2025, 6:40:04 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats