Description
The DethemeKit For Elementor plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 2.36 via the duplicate_post() function due to insufficient restrictions on which posts can be duplicated. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract data from password protected, private, draft, or scheduled posts that they should not have access to by duplicating the post.
Published: 2025-02-13
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Information Disclosure
Action: Immediate Patch
AI Analysis

Impact

The DethemeKit For Elementor plugin for WordPress suffers from a vulnerability that allows authenticated users with Contributor-level access or higher to duplicate posts that are password protected, private, draft, or scheduled. By using the duplicate_post() function, the attacker can retrieve the content of posts that the user should not be able to view, thereby exposing sensitive information. This flaw is a classic example of an information exposure weakness (CWE‑639).

Affected Systems

All installations of DethemeKit for Elementor version 2.36 or earlier are affected. The plugin is distributed by Detheme and installed via the WordPress plugin repository. Any site running one of these affected versions may be vulnerable if it grants contributors the ability to duplicate posts.

Risk and Exploitability

The CVSS score of 4.3 indicates moderate severity. An EPSS score of less than 1% suggests a low probability of exploitation in the wild, but the flaw remains public and the function can be invoked by any user with the Contributor capability. Because the attack requires authenticated access, it is not a remote code execution vector, yet it exposes confidential content. The vulnerability is not listed in the CISA KEV catalog, and no official Certified CNA workaround is available. Attacker likely obtains the exposed data by simply duplicating the restricted post through the plugin’s UI or API.

Generated by OpenCVE AI on April 28, 2026 at 12:04 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade DethemeKit for Elementor to a patched version newer than 2.36 or the latest release provided by Detheme.
  • Revoke or restrict the duplicate_post capability for the Contributor role so that only Administrators retain the ability to duplicate posts.
  • Modify plugin settings or add custom code to block duplication of password protected, private, draft, or scheduled posts and enforce strict role permissions.

Generated by OpenCVE AI on April 28, 2026 at 12:04 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-1807 The DethemeKit For Elementor plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 2.36 via the duplicate_post() function due to insufficient restrictions on which posts can be duplicated. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract data from password protected, private, draft, or scheduled posts that they should not have access to by duplicating the post.
History

Sun, 13 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00031}

epss

{'score': 0.00034}


Sat, 12 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00042}

epss

{'score': 0.00031}


Mon, 24 Feb 2025 17:30:00 +0000

Type Values Removed Values Added
First Time appeared Detheme
Detheme dethemekit For Elementor
Weaknesses NVD-CWE-noinfo
CPEs cpe:2.3:a:detheme:dethemekit_for_elementor:*:*:*:*:*:wordpress:*:*
Vendors & Products Detheme
Detheme dethemekit For Elementor

Thu, 13 Feb 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 13 Feb 2025 07:15:00 +0000

Type Values Removed Values Added
Description The DethemeKit For Elementor plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 2.36 via the duplicate_post() function due to insufficient restrictions on which posts can be duplicated. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract data from password protected, private, draft, or scheduled posts that they should not have access to by duplicating the post.
Title DethemeKit For Elementor <= 2.1.8 - Authenticated (Contributor+) Protected Post Disclosure
Weaknesses CWE-639
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}


Subscriptions

Detheme Dethemekit For Elementor
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:40:44.947Z

Reserved: 2025-01-23T01:19:54.957Z

Link: CVE-2025-0661

cve-icon Vulnrichment

Updated: 2025-02-13T14:52:22.687Z

cve-icon NVD

Status : Analyzed

Published: 2025-02-13T07:15:10.777

Modified: 2025-02-24T17:10:16.007

Link: CVE-2025-0661

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T12:15:30Z

Weaknesses