Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2918: CWE-639 Authorization Bypass Through User-Controlled Key in thehappymonster Happy Addons for Elementor

0
Medium
VulnerabilityCVE-2026-2918cvecve-2026-2918cwe-639
Published: Wed Mar 11 2026 (03/11/2026, 07:36:23 UTC)
Source: CVE Database V5
Vendor/Project: thehappymonster
Product: Happy Addons for Elementor

Description

CVE-2026-2918 is a medium-severity vulnerability in the Happy Addons for Elementor WordPress plugin, affecting all versions up to 3. 21. 0. It involves an authorization bypass due to improper capability checks in AJAX actions, allowing authenticated users with Contributor-level access or higher to modify display conditions of published templates. Additionally, improper output escaping in the condition renderer enables stored cross-site scripting (XSS) attacks, where malicious JavaScript executes when an administrator views the affected panel. Exploitation requires authentication but no user interaction. The vulnerability impacts confidentiality and integrity but not availability. No known exploits are currently reported in the wild. Organizations using this plugin should prioritize patching or applying mitigations to prevent unauthorized template modifications and XSS attacks.

AI-Powered Analysis

AILast updated: 03/11/2026, 08:14:44 UTC

Technical Analysis

CVE-2026-2918 is a vulnerability classified under CWE-639 (Authorization Bypass Through User-Controlled Key) found in the Happy Addons for Elementor WordPress plugin, versions up to and including 3.21.0. The root cause lies in improper authorization checks within two AJAX actions: 'ha_condition_update' and 'ha_get_current_condition'. Specifically, the 'validate_reqeust()' method incorrectly uses 'current_user_can('edit_posts', $template_id)' instead of the correct 'current_user_can('edit_post', $template_id)', failing to enforce object-level authorization. This flaw allows authenticated users with Contributor-level privileges or higher to modify the display conditions of any published 'ha_library' template, which should normally be restricted. Furthermore, the 'ha_get_current_condition' AJAX action lacks any capability check, further exposing the system. Compounding the issue, the 'cond_to_html()' renderer outputs condition values directly into HTML attributes without proper escaping, using string concatenation instead of WordPress's 'esc_attr()' function. This improper output sanitization enables attackers to inject malicious event handler attributes, such as 'onmouseover', leading to stored cross-site scripting (XSS). When an administrator views the Template Conditions panel, the injected JavaScript executes, potentially compromising administrative sessions or enabling further attacks. The vulnerability has a CVSS 3.1 base score of 6.4, reflecting medium severity, with network attack vector, low attack complexity, requiring privileges (Contributor or higher), no user interaction, and scope change. No patches or known exploits are currently reported, but the vulnerability poses a significant risk to sites using this plugin without mitigation.

Potential Impact

The vulnerability allows authenticated users with Contributor-level access or higher to bypass intended authorization controls and modify display conditions of published templates, potentially altering site content or behavior in unauthorized ways. The stored XSS component can lead to session hijacking, privilege escalation, or deployment of malicious scripts when administrators access the affected panel, compromising site integrity and confidentiality. Although availability is not directly impacted, the integrity and confidentiality risks can lead to reputational damage, data leakage, and further exploitation. Organizations relying on the Happy Addons for Elementor plugin are at risk of unauthorized content manipulation and administrative account compromise, especially if multiple users have Contributor or higher privileges. The attack requires authentication but no additional user interaction, increasing the likelihood of exploitation in environments with multiple contributors. The lack of patches and public exploits suggests a window of exposure that must be addressed proactively.

Mitigation Recommendations

Organizations should immediately review user roles and restrict Contributor-level or higher access to trusted users only. Implement strict role-based access controls to minimize the number of users who can exploit this vulnerability. Until an official patch is released, consider disabling or removing the Happy Addons for Elementor plugin if feasible. If removal is not possible, apply custom code filters or hooks to enforce proper capability checks on the affected AJAX actions, replacing 'current_user_can('edit_posts', $template_id)' with 'current_user_can('edit_post', $template_id)'. Additionally, sanitize all user-supplied input and output by overriding or patching the 'cond_to_html()' renderer to use 'esc_attr()' or equivalent escaping functions to prevent XSS. Monitor administrative access logs for suspicious activity, especially around template condition modifications. Educate administrators to be cautious when viewing the Template Conditions panel until the vulnerability is resolved. Stay updated with vendor advisories for official patches and apply them promptly once available.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-02-20T21:49:53.519Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b121032f860ef9435ba54e

Added to database: 3/11/2026, 8:00:03 AM

Last enriched: 3/11/2026, 8:14:44 AM

Last updated: 3/11/2026, 9:54:59 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses