Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-8489: CWE-269 Improper Privilege Management in kingaddons King Addons for Elementor – 4,000+ ready Elementor sections, 650+ templates, 70+ FREE widgets for Elementor

0
Critical
VulnerabilityCVE-2025-8489cvecve-2025-8489cwe-269
Published: Fri Oct 31 2025 (10/31/2025, 06:42:55 UTC)
Source: CVE Database V5
Vendor/Project: kingaddons
Product: King Addons for Elementor – 4,000+ ready Elementor sections, 650+ templates, 70+ FREE widgets for Elementor

Description

The King Addons for Elementor – Free Elements, Widgets, Templates, and Features for Elementor plugin for WordPress is vulnerable to privilege escalation in versions 24.12.92 to 51.1.14 . This is due to the plugin not properly restricting the roles that users can register with. This makes it possible for unauthenticated attackers to register with administrator-level user accounts.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 17:12:30 UTC

Technical Analysis

The vulnerability identified as CVE-2025-8489 affects the King Addons for Elementor plugin for WordPress, which provides extensive Elementor sections, templates, and widgets. The root cause is improper privilege management (CWE-269), where the plugin fails to correctly restrict the roles assigned to newly registered users. Specifically, unauthenticated attackers can exploit this flaw to register accounts with administrator privileges without any authentication or user interaction. This is due to insufficient validation or role assignment controls during the user registration process within the plugin. The affected versions span from 24.12.92 to 51.1.14, covering all versions in that range. The vulnerability has a CVSS 3.1 base score of 9.8, indicating critical severity with network attack vector, low attack complexity, no privileges required, no user interaction, and impacts on confidentiality, integrity, and availability. Exploitation would allow attackers to fully compromise the WordPress site, including installing backdoors, modifying content, stealing sensitive data, or disrupting services. Although no known exploits are currently reported in the wild, the nature of the vulnerability makes it highly attractive for attackers targeting WordPress sites using this popular plugin. The vulnerability was publicly disclosed on October 31, 2025, with Wordfence as the assigner. No official patches or updates are linked yet, emphasizing the need for immediate attention from site administrators.

Potential Impact

The impact of CVE-2025-8489 is severe and wide-ranging. Organizations running WordPress sites with the vulnerable King Addons for Elementor plugin risk complete site takeover by unauthenticated attackers. This can lead to unauthorized data access, defacement, insertion of malicious code or malware, and disruption of website availability. For e-commerce, financial, or data-sensitive websites, this could result in significant financial losses, reputational damage, and regulatory penalties due to data breaches. The vulnerability undermines the trustworthiness of the affected websites and can be leveraged as a foothold for further attacks within an organization's network. Given the plugin's popularity and extensive use worldwide, the scope of affected systems is large, increasing the potential for widespread exploitation and cascading impacts on business operations and customer trust.

Mitigation Recommendations

Until an official patch is released, organizations should take immediate steps to mitigate the risk. First, disable user registration on affected WordPress sites if it is not essential. If registration is required, implement additional access controls or manual approval workflows to prevent unauthorized admin account creation. Monitor user accounts for suspicious new administrator accounts and remove any unauthorized users promptly. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious registration attempts targeting this plugin. Keep all WordPress core and plugins updated and subscribe to security advisories from the plugin vendor and WordPress security communities. Once a patch is available, apply it immediately. Additionally, conduct regular security audits and backups to enable rapid recovery in case of compromise. Consider restricting plugin usage to trusted environments or replacing it with alternative solutions if immediate patching is not feasible.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-08-01T21:12:39.827Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69045cb533ef7ec3128437a1

Added to database: 10/31/2025, 6:52:37 AM

Last enriched: 2/26/2026, 5:12:30 PM

Last updated: 3/22/2026, 7:39:16 AM

Views: 400

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses