Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67540: Missing Authorization in Wealcoder Animation Addons for Elementor

0
Medium
VulnerabilityCVE-2025-67540cvecve-2025-67540
Published: Tue Dec 09 2025 (12/09/2025, 14:14:05 UTC)
Source: CVE Database V5
Vendor/Project: Wealcoder
Product: Animation Addons for Elementor

Description

Missing Authorization vulnerability in Wealcoder Animation Addons for Elementor animation-addons-for-elementor allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Animation Addons for Elementor: from n/a through <= 2.4.5.

AI-Powered Analysis

AILast updated: 02/03/2026, 08:10:27 UTC

Technical Analysis

CVE-2025-67540 identifies a missing authorization vulnerability in the Wealcoder Animation Addons for Elementor plugin, specifically affecting versions up to 2.4.5. The vulnerability arises from incorrectly configured access control mechanisms, which fail to properly verify whether a user has the necessary permissions to perform certain actions within the plugin. This flaw allows an attacker with low-level privileges (PR:L) to exploit the plugin remotely (AV:N) without requiring any user interaction (UI:N). The primary impact is on the integrity of the system, as unauthorized users can modify animation settings or related content, potentially leading to defacement, misinformation, or other unauthorized changes. Confidentiality and availability are not impacted by this vulnerability. The vulnerability is network exploitable and does not require elevated privileges beyond low-level access, making it easier for attackers who have some access to the WordPress backend or authenticated user accounts. No patches or exploit code are currently publicly available, and no known exploitation in the wild has been reported. The vulnerability is classified as medium severity with a CVSS v3.1 base score of 6.5, reflecting the balance between ease of exploitation and the limited scope of impact.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to the integrity of websites using the Wealcoder Animation Addons for Elementor plugin. Unauthorized modifications could lead to defacement, misleading content, or disruption of user experience, potentially damaging brand reputation and customer trust. Organizations in sectors such as e-commerce, media, and public services that rely heavily on WordPress for their web presence are particularly at risk. While the vulnerability does not directly compromise sensitive data confidentiality or site availability, the ability to alter content without authorization can have significant indirect consequences, including regulatory scrutiny under GDPR if misinformation or unauthorized content affects users. The ease of exploitation by low-privilege users means that insider threats or compromised low-level accounts could be leveraged to exploit this vulnerability. Given the widespread use of WordPress and Elementor plugins across Europe, the potential attack surface is substantial, especially for organizations that have not implemented strict access controls or monitoring.

Mitigation Recommendations

To mitigate this vulnerability, organizations should: 1) Monitor Wealcoder’s official channels for security patches and apply updates to the Animation Addons for Elementor plugin promptly once available. 2) Restrict access to WordPress backend areas where the plugin is used, ensuring that only trusted users have low-level privileges that could be exploited. 3) Implement role-based access controls (RBAC) to minimize the number of users with permissions that could be abused. 4) Conduct regular audits of user accounts and permissions to detect and remove unnecessary or suspicious access. 5) Employ web application firewalls (WAFs) with custom rules to detect and block anomalous requests targeting the plugin’s endpoints. 6) Monitor website content and configuration for unauthorized changes to quickly identify exploitation attempts. 7) Educate administrators and content managers about the risks of privilege misuse and the importance of secure credential management. These steps go beyond generic advice by focusing on access control hardening, proactive monitoring, and rapid patch management tailored to this specific plugin vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-12-09T12:21:12.170Z
Cvss Version
null
State
PUBLISHED

Threat ID: 693833a629cea75c35ae52f8

Added to database: 12/9/2025, 2:35:18 PM

Last enriched: 2/3/2026, 8:10:27 AM

Last updated: 2/6/2026, 3:18:48 AM

Views: 47

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats