Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

WordPress Elementor Addon Flaw Exploited

December 4, 2025
Reading Time: 3 mins read
in Alerts
WordPress Elementor Addon Flaw Exploited

Attackers have rapidly begun exploiting a critical-severity privilege escalation vulnerability, tracked as CVE-2025–8489, found in the King Addons for Elementor plugin, which is used on approximately 10,000 WordPress websites. This flaw allows malicious users to obtain administrative permissions simply by manipulating the user registration process. Threat activity commenced almost immediately, on October 31, just one day after the security issue was publicly disclosed. Defiant’s Wordfence security scanner has already registered and blocked a significant volume of exploit attempts, totaling more than 48,400, indicating a widespread and automated targeting of vulnerable sites.

The vulnerability, discovered by researcher Peter Thaleikis, lies specifically within the plugin’s registration handler. It fails to impose any restrictions, allowing anyone signing up to freely specify their user role, including the highly-privileged ‘administrator’ role. Wordfence observations show that attackers are leveraging this by sending a specially crafted ‘admin-ajax.php’ request that includes the parameter ‘user_role=administrator’ to successfully create unauthorized administrative accounts on targeted websites. Exploitation peaked between November 9 and 10, with two IP addresses, 45.61.157.120 and 2602:fa59:3:424::1, responsible for the vast majority of blocked attempts.

To secure their installations against the King Addons vulnerability, website owners must immediately upgrade to version 51.1.35 of the plugin, which contains the fix for CVE-2025–8489 and was released on September 25. Administrators should also proactively search their log files for the offensive IP addresses provided by Wordfence, as well as checking for the unexpected presence of newly created administrative user accounts, which would be a clear indication of a successful compromise.

Separately, Wordfence researchers are issuing a warning about another critical security flaw, CVE-2025-13486, affecting the Advanced Custom Fields: Extended plugin, which is active on over 100,000 WordPress sites. This more severe vulnerability can be exploited by an unauthenticated attacker to remotely execute arbitrary code (RCE). The flaw affects versions 0.9.0.5 through 0.9.1.1 and was responsibly discovered and reported by Marcin Dudek, the head of Poland’s national computer emergency response team (CERT).

The technical root cause of this RCE is the plugin’s use of the function call\_user\_func\_array() which accepts unfiltered user input, making it possible for unauthenticated attackers to execute arbitrary code on the server. This can be exploited to inject backdoors or, similar to the King Addons flaw, create new administrative user accounts. The security issue was reported on November 18, and the vendor swiftly released version 0.9.2 of Advanced Custom Fields: Extended the following day to address it. Given that this RCE can be leveraged without authentication, website owners must update to the latest version as quickly as possible or consider disabling the plugin temporarily to mitigate the high risk of malicious activity following the public disclosure of technical details.

Reference:

  • Attackers Exploit Serious Vulnerability In WordPress Addon Used With Elementor
Tags: Cyber AlertsCyber Alerts 2025CyberattackCybersecurityDecember 2025
ADVERTISEMENT

Related Posts

WordPress Elementor Addon Flaw Exploited

Record DDoS Linked To Massive Botnet

December 4, 2025
WordPress Elementor Addon Flaw Exploited

RSC Bugs Let Hackers Run Remote Code Now

December 4, 2025
Illuminate Must Delete Student Data

Lazarus APT Remote Worker Scheme Caught

December 3, 2025
Rust Crate Spreads Malware To Web3 Devs

Google Fixes 107 Android Flaws In Use

December 3, 2025
Rust Crate Spreads Malware To Web3 Devs

Npm Package Evades AI Security Tools

December 3, 2025
Rust Crate Spreads Malware To Web3 Devs

Rust Crate Spreads Malware To Web3 Devs

December 3, 2025

Latest Alerts

Record DDoS Linked To Massive Botnet

RSC Bugs Let Hackers Run Remote Code Now

WordPress Elementor Addon Flaw Exploited

Lazarus APT Remote Worker Scheme Caught

Google Fixes 107 Android Flaws In Use

Npm Package Evades AI Security Tools

Subscribe to our newsletter

    Latest Incidents

    Freedom Mobile Customer Data Breach Exposed

    Penn Phoenix Data Breach Oracle Hack Now

    Defender Outage Disrupts Threat Alerting

    Indian Airports Hit By Cyber Attack

    ChatGPT Down Worldwide Users Affected

    Sorbonne Staff Data Found On Dark Web

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial