Description
Multiple plugins for WordPress with the Jewel Theme Recommended Plugins Library are vulnerable to Unrestricted Upload of File with Dangerous Type via arbitrary plugin installation in all versions up to, and including, 1.0.2.3. This is due to missing capability checks on the '*_recommended_upgrade_plugin' function which allows arbitrary plugin URLs to be installed. This makes it possible for authenticated attackers with subscriber-level access and above to upload arbitrary plugin packages to the affected site's server via a crafted plugin URL, which may make remote code execution possible.
Published: 2025-11-04
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Apply Patch
AI Analysis

Impact

The flaw stems from a missing capability check on a plugin upgrade function, allowing any user with subscriber-level access or higher to supply an arbitrary plugin URL and trigger an installation. Once a plugin package is placed on the server, the WordPress core will unpack and activate it, giving the attacker the ability to run code with the same privileges as the user who performed the upload. The vulnerability is rooted in an authorization weakness (CWE-862) and can lead to full system compromise if the uploaded plugin contains malicious payloads.

Affected Systems

WordPress sites that have installed any of the following plugins from the Jewel Theme Recommended Plugins Library: Content Locker for Elementor, Image Comparison Addon for Elementor, Image Hover Effects for Elementor, and Master Blocks – Ultimate Gutenberg Blocks for Marketers. The issue exists in all released versions up to and including 1.0.2.3, regardless of the site’s theme or other plugins.

Risk and Exploitability

The CVSS score of 8.8 indicates a high severity, reflecting the potential for significant damage from an authenticated attacker. The EPSS score of less than 1% suggests that, at present, automated exploitation is unlikely, yet the presence of the vulnerability in widely used community plugins keeps it a realistic risk for sites run by organizations with some level of internal access. As the vulnerability is not listed in the CISA KEV catalog, there is no widespread exploit campaign known, but the controlled nature of the attack vector—requiring subscriber+ login—still makes the issue a critical concern for hosts that allow such users to manage site content.

Generated by OpenCVE AI on April 22, 2026 at 21:22 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade all affected plugins to a release newer than 1.0.2.3 immediately after it becomes available from the vendor.
  • If an upgrade cannot be applied, remove or disable the vulnerable plugins entirely and block any future plugin upload actions for non‑administrator accounts by editing the site’s wp-config.php or using a security plugin that restricts upload capabilities.
  • Verify that no unauthorized or suspicious plugin files remain on the server; remove any that are found and conduct a scan for malware before reopening normal plugin upload functionality.

Generated by OpenCVE AI on April 22, 2026 at 21:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 08 Apr 2026 17:00:00 +0000


Tue, 04 Nov 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 04 Nov 2025 16:45:00 +0000

Type Values Removed Values Added
First Time appeared Elementor
Elementor elementor
Litonice13
Litonice13 image Hover Effects For Elementor
Wordpress
Wordpress wordpress
Vendors & Products Elementor
Elementor elementor
Litonice13
Litonice13 image Hover Effects For Elementor
Wordpress
Wordpress wordpress

Tue, 04 Nov 2025 04:45:00 +0000

Type Values Removed Values Added
Description Multiple plugins for WordPress with the Jewel Theme Recommended Plugins Library are vulnerable to Unrestricted Upload of File with Dangerous Type via arbitrary plugin installation in all versions up to, and including, 1.0.2.3. This is due to missing capability checks on the '*_recommended_upgrade_plugin' function which allows arbitrary plugin URLs to be installed. This makes it possible for authenticated attackers with subscriber-level access and above to upload arbitrary plugin packages to the affected site's server via a crafted plugin URL, which may make remote code execution possible.
Title Multiple Plugins <= Multiple Versions - Missing Authorization to Authenticated (Subscriber+) Arbitrary Plugin Upload
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Elementor Elementor
Litonice13 Image Hover Effects For Elementor
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:35:52.884Z

Reserved: 2025-09-23T18:24:04.128Z

Link: CVE-2025-10896

cve-icon Vulnrichment

Updated: 2025-11-04T20:55:46.342Z

cve-icon NVD

Status : Deferred

Published: 2025-11-04T05:15:49.360

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-10896

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T21:30:27Z

Weaknesses