The Element Pack Addons for Elementor plugin for WordPress is vulnerable to Blind Server-Side Request Forgery in all versions up to, and including, 8.2.5 via the wp_ajax_import_elementor_template action. This makes it possible for authenticated attackers, with Subscriber-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.
Metrics
Affected Vendors & Products
References
History
Tue, 21 Oct 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 21 Oct 2025 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Bdthemes
Bdthemes element Pack Bdthemes element Pack Elementor Addons Element Pack Elementor Addons Wordpress Element Pack Elementor Addons Wordpress element Pack Elementor Addons Wordpress Wordpress Wordpress wordpress |
|
| Vendors & Products |
Bdthemes
Bdthemes element Pack Bdthemes element Pack Elementor Addons Element Pack Elementor Addons Wordpress Element Pack Elementor Addons Wordpress element Pack Elementor Addons Wordpress Wordpress Wordpress wordpress |
Mon, 20 Oct 2025 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Element Pack Addons for Elementor plugin for WordPress is vulnerable to Blind Server-Side Request Forgery in all versions up to, and including, 8.2.5 via the wp_ajax_import_elementor_template action. This makes it possible for authenticated attackers, with Subscriber-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services. | |
| Title | Element Pack Addons for Elementor <= 8.2.5 - Authenticated (Subscriber+) Blind Server-Side Request Forgery | |
| Weaknesses | CWE-918 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published: 2025-10-20T21:23:48.282Z
Updated: 2025-10-21T14:09:22.901Z
Reserved: 2025-10-08T22:16:18.680Z
Link: CVE-2025-11536
Updated: 2025-10-21T13:43:09.434Z
Status : Awaiting Analysis
Published: 2025-10-20T22:15:36.727
Modified: 2025-10-21T19:31:25.450
Link: CVE-2025-11536
No data.