Description
The Jeg Elementor Kit plugin for WordPress is vulnerable to authorization bypass in various functions used to update the plugin settings in versions up to, and including, 2.5.6. Unauthenticated users can use an easily available nonce, obtained from pages edited by the plugin, to update the MailChimp API key, global styles, 404 page settings, and enabled elements.
Published: 2022-12-22
Score: 8.6 High
EPSS: 9.0% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2022-43146 The Jeg Elementor Kit plugin for WordPress is vulnerable to authorization bypass in various functions used to update the plugin settings in versions up to, and including, 2.5.6. Unauthenticated users can use an easily available nonce, obtained from pages edited by the plugin, to update the MailChimp API key, global styles, 404 page settings, and enabled elements.
History

Wed, 08 Apr 2026 18:30:00 +0000

Type Values Removed Values Added
Title Jeg Elementor Kit <= 2.5.6 - Unauthenticated Authorization Bypass
Weaknesses CWE-639
References

Thu, 23 Jan 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Subscriptions

Jegtheme Jeg Elementor Kit
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:21:54.783Z

Reserved: 2022-11-01T15:58:20.114Z

Link: CVE-2022-3805

cve-icon Vulnrichment

Updated: 2024-08-03T01:20:57.662Z

cve-icon NVD

Status : Modified

Published: 2022-12-22T21:15:10.650

Modified: 2026-04-08T19:17:53.467

Link: CVE-2022-3805

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses