WordPress King Addons Flaw Under Active Attack Lets Hackers Make Admin Accounts
A critical security flaw impacting a WordPress plugin known as King Addons for Elementor has come under active exploitation in the wild. The vulnerability, CVE-2025-8489 (CVSS score: 9.8), is a case of privilege escalation that allows unauthenticated attackers to grant themselves administrative privileges by simply specifying the administrator user role during registration. It affects versions
AI Analysis
Technical Summary
The WordPress plugin King Addons for Elementor, widely used with over 10,000 active installations, contains a critical privilege escalation vulnerability identified as CVE-2025-8489 with a CVSS score of 9.8. The flaw resides in the handle_register_ajax() function, which processes user registrations via AJAX calls to /wp-admin/admin-ajax.php. Due to improper role restriction checks, unauthenticated attackers can specify the 'administrator' role during registration, thereby creating accounts with full administrative privileges without any authentication or user interaction. This vulnerability affects plugin versions from 24.12.92 through 51.1.14 and was patched in version 51.1.35 released on September 25, 2025. Since public disclosure in late October 2025, active exploitation has been observed, with Wordfence reporting over 48,400 blocked attempts and ongoing attacks from multiple IP addresses. Exploiting this flaw allows attackers to fully compromise affected WordPress sites, enabling them to upload malicious code, redirect traffic, inject spam, or conduct further attacks. The vulnerability’s root cause is an insecure implementation of role assignment during registration, making it trivial for attackers to escalate privileges. The plugin’s widespread use and the critical nature of the flaw make it a significant threat to WordPress-based websites worldwide.
Potential Impact
For European organizations, this vulnerability poses a severe risk to the confidentiality, integrity, and availability of WordPress-based websites and services. Compromise of administrative accounts can lead to complete site takeover, data breaches, defacement, malware distribution, and loss of customer trust. Organizations relying on King Addons for Elementor for their web presence or e-commerce platforms may face operational disruption, reputational damage, and potential regulatory consequences under GDPR if personal data is exposed. The ease of exploitation without authentication or user interaction increases the likelihood of successful attacks. Additionally, attackers can leverage compromised sites as footholds for lateral movement or to launch further attacks against internal networks. Given the active exploitation and volume of attack attempts, European entities using vulnerable plugin versions are at immediate risk and must act swiftly to mitigate exposure.
Mitigation Recommendations
European organizations should immediately verify the version of King Addons for Elementor installed on their WordPress sites and upgrade to version 51.1.35 or later, where the vulnerability is patched. Conduct a thorough audit of all user accounts to identify and remove any unauthorized administrator accounts created since October 2025. Implement enhanced monitoring and logging on WordPress admin endpoints, especially /wp-admin/admin-ajax.php, to detect suspicious registration attempts specifying elevated roles. Employ web application firewalls (WAFs) with rules to block or rate-limit suspicious AJAX registration requests. Restrict access to WordPress admin endpoints by IP where feasible, and enforce multi-factor authentication (MFA) for all administrator accounts to reduce impact if compromise occurs. Regularly review plugin and theme updates and subscribe to security advisories for timely patching. Finally, conduct post-incident forensic analysis if compromise is suspected to identify and remediate any backdoors or malicious code.
Affected Countries
Germany, United Kingdom, France, Italy, Spain, Netherlands, Poland, Sweden, Belgium, Austria
WordPress King Addons Flaw Under Active Attack Lets Hackers Make Admin Accounts
Description
A critical security flaw impacting a WordPress plugin known as King Addons for Elementor has come under active exploitation in the wild. The vulnerability, CVE-2025-8489 (CVSS score: 9.8), is a case of privilege escalation that allows unauthenticated attackers to grant themselves administrative privileges by simply specifying the administrator user role during registration. It affects versions
AI-Powered Analysis
Technical Analysis
The WordPress plugin King Addons for Elementor, widely used with over 10,000 active installations, contains a critical privilege escalation vulnerability identified as CVE-2025-8489 with a CVSS score of 9.8. The flaw resides in the handle_register_ajax() function, which processes user registrations via AJAX calls to /wp-admin/admin-ajax.php. Due to improper role restriction checks, unauthenticated attackers can specify the 'administrator' role during registration, thereby creating accounts with full administrative privileges without any authentication or user interaction. This vulnerability affects plugin versions from 24.12.92 through 51.1.14 and was patched in version 51.1.35 released on September 25, 2025. Since public disclosure in late October 2025, active exploitation has been observed, with Wordfence reporting over 48,400 blocked attempts and ongoing attacks from multiple IP addresses. Exploiting this flaw allows attackers to fully compromise affected WordPress sites, enabling them to upload malicious code, redirect traffic, inject spam, or conduct further attacks. The vulnerability’s root cause is an insecure implementation of role assignment during registration, making it trivial for attackers to escalate privileges. The plugin’s widespread use and the critical nature of the flaw make it a significant threat to WordPress-based websites worldwide.
Potential Impact
For European organizations, this vulnerability poses a severe risk to the confidentiality, integrity, and availability of WordPress-based websites and services. Compromise of administrative accounts can lead to complete site takeover, data breaches, defacement, malware distribution, and loss of customer trust. Organizations relying on King Addons for Elementor for their web presence or e-commerce platforms may face operational disruption, reputational damage, and potential regulatory consequences under GDPR if personal data is exposed. The ease of exploitation without authentication or user interaction increases the likelihood of successful attacks. Additionally, attackers can leverage compromised sites as footholds for lateral movement or to launch further attacks against internal networks. Given the active exploitation and volume of attack attempts, European entities using vulnerable plugin versions are at immediate risk and must act swiftly to mitigate exposure.
Mitigation Recommendations
European organizations should immediately verify the version of King Addons for Elementor installed on their WordPress sites and upgrade to version 51.1.35 or later, where the vulnerability is patched. Conduct a thorough audit of all user accounts to identify and remove any unauthorized administrator accounts created since October 2025. Implement enhanced monitoring and logging on WordPress admin endpoints, especially /wp-admin/admin-ajax.php, to detect suspicious registration attempts specifying elevated roles. Employ web application firewalls (WAFs) with rules to block or rate-limit suspicious AJAX registration requests. Restrict access to WordPress admin endpoints by IP where feasible, and enforce multi-factor authentication (MFA) for all administrator accounts to reduce impact if compromise occurs. Regularly review plugin and theme updates and subscribe to security advisories for timely patching. Finally, conduct post-incident forensic analysis if compromise is suspected to identify and remediate any backdoors or malicious code.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Article Source
- {"url":"https://thehackernews.com/2025/12/wordpress-king-addons-flaw-under-active.html","fetched":true,"fetchedAt":"2025-12-03T18:00:34.465Z","wordCount":949}
Threat ID: 69307ac6b129615efa180f93
Added to database: 12/3/2025, 6:00:38 PM
Last enriched: 12/3/2025, 6:00:54 PM
Last updated: 12/4/2025, 11:19:12 AM
Views: 14
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
React2Shell: In-the-Wild Exploitation Expected for Critical React Vulnerability
CriticalCritical RSC Bugs in React and Next.js Allow Unauthenticated Remote Code Execution
CriticalCritical King Addons Vulnerability Exploited to Hack WordPress Sites
CriticalMicrosoft Silently Mitigated Exploited LNK Vulnerability
CriticalThe $9M yETH Exploit: How 16 Wei Became Infinite Tokens
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.