WordPress King Addons Flaw Under Active Attack Lets Hackers Make Admin Accounts
A critical security flaw impacting a WordPress plugin known as King Addons for Elementor has come under active exploitation in the wild. The vulnerability, CVE-2025-8489 (CVSS score: 9.8), is a case of privilege escalation that allows unauthenticated attackers to grant themselves administrative privileges by simply specifying the administrator user role during registration. It affects versions
AI Analysis
Technical Summary
The WordPress plugin King Addons for Elementor, widely used with over 10,000 active installations, contains a critical privilege escalation vulnerability identified as CVE-2025-8489 with a CVSS score of 9.8. The flaw resides in the handle_register_ajax() function, which processes user registrations via AJAX calls to /wp-admin/admin-ajax.php. Due to improper role restriction checks, unauthenticated attackers can specify the 'administrator' role during registration, thereby creating accounts with full administrative privileges without any authentication or user interaction. This vulnerability affects plugin versions from 24.12.92 through 51.1.14 and was patched in version 51.1.35 released on September 25, 2025. Since public disclosure in late October 2025, active exploitation has been observed, with Wordfence reporting over 48,400 blocked attempts and ongoing attacks from multiple IP addresses. Exploiting this flaw allows attackers to fully compromise affected WordPress sites, enabling them to upload malicious code, redirect traffic, inject spam, or conduct further attacks. The vulnerability’s root cause is an insecure implementation of role assignment during registration, making it trivial for attackers to escalate privileges. The plugin’s widespread use and the critical nature of the flaw make it a significant threat to WordPress-based websites worldwide.
Potential Impact
For European organizations, this vulnerability poses a severe risk to the confidentiality, integrity, and availability of WordPress-based websites and services. Compromise of administrative accounts can lead to complete site takeover, data breaches, defacement, malware distribution, and loss of customer trust. Organizations relying on King Addons for Elementor for their web presence or e-commerce platforms may face operational disruption, reputational damage, and potential regulatory consequences under GDPR if personal data is exposed. The ease of exploitation without authentication or user interaction increases the likelihood of successful attacks. Additionally, attackers can leverage compromised sites as footholds for lateral movement or to launch further attacks against internal networks. Given the active exploitation and volume of attack attempts, European entities using vulnerable plugin versions are at immediate risk and must act swiftly to mitigate exposure.
Mitigation Recommendations
European organizations should immediately verify the version of King Addons for Elementor installed on their WordPress sites and upgrade to version 51.1.35 or later, where the vulnerability is patched. Conduct a thorough audit of all user accounts to identify and remove any unauthorized administrator accounts created since October 2025. Implement enhanced monitoring and logging on WordPress admin endpoints, especially /wp-admin/admin-ajax.php, to detect suspicious registration attempts specifying elevated roles. Employ web application firewalls (WAFs) with rules to block or rate-limit suspicious AJAX registration requests. Restrict access to WordPress admin endpoints by IP where feasible, and enforce multi-factor authentication (MFA) for all administrator accounts to reduce impact if compromise occurs. Regularly review plugin and theme updates and subscribe to security advisories for timely patching. Finally, conduct post-incident forensic analysis if compromise is suspected to identify and remediate any backdoors or malicious code.
Affected Countries
Germany, United Kingdom, France, Italy, Spain, Netherlands, Poland, Sweden, Belgium, Austria
WordPress King Addons Flaw Under Active Attack Lets Hackers Make Admin Accounts
Description
A critical security flaw impacting a WordPress plugin known as King Addons for Elementor has come under active exploitation in the wild. The vulnerability, CVE-2025-8489 (CVSS score: 9.8), is a case of privilege escalation that allows unauthenticated attackers to grant themselves administrative privileges by simply specifying the administrator user role during registration. It affects versions
AI-Powered Analysis
Technical Analysis
The WordPress plugin King Addons for Elementor, widely used with over 10,000 active installations, contains a critical privilege escalation vulnerability identified as CVE-2025-8489 with a CVSS score of 9.8. The flaw resides in the handle_register_ajax() function, which processes user registrations via AJAX calls to /wp-admin/admin-ajax.php. Due to improper role restriction checks, unauthenticated attackers can specify the 'administrator' role during registration, thereby creating accounts with full administrative privileges without any authentication or user interaction. This vulnerability affects plugin versions from 24.12.92 through 51.1.14 and was patched in version 51.1.35 released on September 25, 2025. Since public disclosure in late October 2025, active exploitation has been observed, with Wordfence reporting over 48,400 blocked attempts and ongoing attacks from multiple IP addresses. Exploiting this flaw allows attackers to fully compromise affected WordPress sites, enabling them to upload malicious code, redirect traffic, inject spam, or conduct further attacks. The vulnerability’s root cause is an insecure implementation of role assignment during registration, making it trivial for attackers to escalate privileges. The plugin’s widespread use and the critical nature of the flaw make it a significant threat to WordPress-based websites worldwide.
Potential Impact
For European organizations, this vulnerability poses a severe risk to the confidentiality, integrity, and availability of WordPress-based websites and services. Compromise of administrative accounts can lead to complete site takeover, data breaches, defacement, malware distribution, and loss of customer trust. Organizations relying on King Addons for Elementor for their web presence or e-commerce platforms may face operational disruption, reputational damage, and potential regulatory consequences under GDPR if personal data is exposed. The ease of exploitation without authentication or user interaction increases the likelihood of successful attacks. Additionally, attackers can leverage compromised sites as footholds for lateral movement or to launch further attacks against internal networks. Given the active exploitation and volume of attack attempts, European entities using vulnerable plugin versions are at immediate risk and must act swiftly to mitigate exposure.
Mitigation Recommendations
European organizations should immediately verify the version of King Addons for Elementor installed on their WordPress sites and upgrade to version 51.1.35 or later, where the vulnerability is patched. Conduct a thorough audit of all user accounts to identify and remove any unauthorized administrator accounts created since October 2025. Implement enhanced monitoring and logging on WordPress admin endpoints, especially /wp-admin/admin-ajax.php, to detect suspicious registration attempts specifying elevated roles. Employ web application firewalls (WAFs) with rules to block or rate-limit suspicious AJAX registration requests. Restrict access to WordPress admin endpoints by IP where feasible, and enforce multi-factor authentication (MFA) for all administrator accounts to reduce impact if compromise occurs. Regularly review plugin and theme updates and subscribe to security advisories for timely patching. Finally, conduct post-incident forensic analysis if compromise is suspected to identify and remediate any backdoors or malicious code.
Technical Details
- Article Source
- {"url":"https://thehackernews.com/2025/12/wordpress-king-addons-flaw-under-active.html","fetched":true,"fetchedAt":"2025-12-03T18:00:34.465Z","wordCount":949}
Threat ID: 69307ac6b129615efa180f93
Added to database: 12/3/2025, 6:00:38 PM
Last enriched: 12/3/2025, 6:00:54 PM
Last updated: 1/18/2026, 3:21:06 PM
Views: 140
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
China-Linked APT Exploited Sitecore Zero-Day in Critical Infrastructure Intrusions
CriticalCritical WordPress Modular DS Plugin Flaw Actively Exploited to Gain Admin Access
CriticalCritical Node.js Vulnerability Can Cause Server Crashes via async_hooks Stack Overflow
CriticalMicrosoft Fixes 114 Windows Flaws in January 2026 Patch, One Actively Exploited
CriticalFortinet Patches Critical Vulnerabilities in FortiFone, FortiSIEM
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.