Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-6327: Unrestricted Upload of File with Dangerous Type in KingAddons.com King Addons for Elementor

0
Critical
VulnerabilityCVE-2025-6327cvecve-2025-6327
Published: Thu Nov 06 2025 (11/06/2025, 15:56:06 UTC)
Source: CVE Database V5
Vendor/Project: KingAddons.com
Product: King Addons for Elementor

Description

Unrestricted Upload of File with Dangerous Type vulnerability in KingAddons.com King Addons for Elementor king-addons allows Upload a Web Shell to a Web Server.This issue affects King Addons for Elementor: from n/a through <= 51.1.36.

AI-Powered Analysis

AILast updated: 01/21/2026, 02:06:06 UTC

Technical Analysis

CVE-2025-6327 is a critical security vulnerability identified in the King Addons for Elementor WordPress plugin, specifically affecting versions up to 51.1.36. The flaw is an unrestricted file upload vulnerability that permits attackers to upload files of dangerous types without proper validation or restrictions. This weakness enables an unauthenticated attacker to upload a web shell directly to the web server hosting the vulnerable plugin. Once a web shell is uploaded, the attacker gains remote code execution capabilities, allowing full control over the compromised server. The vulnerability has a CVSS 3.1 base score of 10.0, indicating maximum severity with network attack vector, no required privileges or user interaction, and complete impact on confidentiality, integrity, and availability. The vulnerability was reserved in June 2025 and published in November 2025, with no known exploits in the wild at the time of disclosure. The lack of patch links suggests that a fix may not yet be publicly available, increasing the risk window. The plugin is widely used in WordPress environments to enhance Elementor page builder functionality, making many websites potentially vulnerable. Attackers could leverage this vulnerability to deploy malware, conduct data exfiltration, deface websites, or use the compromised server as a pivot point for further attacks within an organization’s network. The vulnerability’s unrestricted upload nature means that standard security controls relying on authentication or user interaction are ineffective, emphasizing the critical need for immediate mitigation.

Potential Impact

For European organizations, the impact of CVE-2025-6327 is severe. Many businesses, government agencies, and e-commerce platforms rely on WordPress and Elementor with King Addons to build and manage their websites. A successful exploit could lead to complete server compromise, resulting in unauthorized access to sensitive data, disruption of online services, and reputational damage. Attackers could deploy ransomware, steal customer information, or manipulate website content, undermining trust and compliance with regulations such as GDPR. The critical nature of the vulnerability means that even organizations with robust perimeter defenses are at risk if the vulnerable plugin is present. Public sector entities and critical infrastructure providers using WordPress-based portals are particularly vulnerable, as compromise could affect citizen services or sensitive communications. Additionally, the ability to execute code remotely without authentication increases the likelihood of automated mass exploitation campaigns targeting European websites. The economic and operational consequences could be substantial, especially for SMEs and organizations lacking dedicated cybersecurity resources.

Mitigation Recommendations

Immediate mitigation steps include monitoring for updates from KingAddons.com and applying patches as soon as they are released. Until a patch is available, organizations should consider disabling or removing the King Addons for Elementor plugin if feasible. Implementing strict web application firewall (WAF) rules to detect and block file upload attempts containing web shells or suspicious payloads can provide temporary protection. Restricting file upload permissions on the server and enforcing server-side validation to allow only safe file types is critical. Organizations should audit their WordPress installations to identify the presence of this plugin and assess exposure. Employing intrusion detection systems (IDS) and continuous monitoring for unusual file uploads or web shell indicators can help detect exploitation attempts early. Regular backups and incident response plans should be updated to prepare for potential compromise. Finally, educating website administrators on the risks of third-party plugins and enforcing least privilege principles for web server accounts will reduce attack surface.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-06-19T10:04:36.817Z
Cvss Version
null
State
PUBLISHED

Threat ID: 690cc81eca26fb4dd2f59cfa

Added to database: 11/6/2025, 4:09:02 PM

Last enriched: 1/21/2026, 2:06:06 AM

Last updated: 2/7/2026, 7:36:11 AM

Views: 242

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats