Description
The Ultimate Member Widgets for Elementor – WordPress User Directory plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the handle_filter_users function in all versions up to, and including, 2.3. This makes it possible for unauthenticated attackers to extract partial metadata of all WordPress users, including their first name, last name and email addresses.
Published: 2025-11-20
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Information disclosure of user metadata
Action: Apply patch
AI Analysis

Impact

The vulnerability originates from a missing capability check in the handle_filter_users function of the Ultimate Member Widgets for Elementor plugin. This flaw allows attackers without authentication to retrieve the first name, last name, and email address of all WordPress users. Such partial data exposure can facilitate targeted phishing, identity theft, or further compromise of user accounts, impacting the privacy of site members.

Affected Systems

WordPress sites running the Ultimate Member Widgets for Elementor – WordPress User Directory plugin versions 2.3 or earlier are affected. The issue applies to all installations of the plugin distributed by userelements.

Risk and Exploitability

This weakness carries a CVSS score of 5.3 and a very low EPSS probability of less than 1%, indicating that exploitation is unlikely to be widespread but the risk remains present. The vulnerability is not listed in CISA's KEV catalog. An attacker can exploit it by sending unauthenticated requests to the endpoint that invokes handle_filter_users, effectively bypassing authorization checks to gain user metadata.

Generated by OpenCVE AI on April 21, 2026 at 01:28 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Ultimate Member Widgets for Elementor to the latest released version (2.4 or newer), which includes the missing capability check.
  • If an update is not immediately possible, disable the plugin or restrict its access to trusted administrative users only.
  • Apply any custom code patch that adds a capability validation before executing handle_filter_users, ensuring users must have adequate permissions to view user data.

Generated by OpenCVE AI on April 21, 2026 at 01:28 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 21 Nov 2025 09:30:00 +0000

Type Values Removed Values Added
First Time appeared Elementor
Elementor elementor
Userelements
Userelements ultimate Member Widgets For Elementor
Wordpress
Wordpress wordpress
Vendors & Products Elementor
Elementor elementor
Userelements
Userelements ultimate Member Widgets For Elementor
Wordpress
Wordpress wordpress

Thu, 20 Nov 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 20 Nov 2025 04:45:00 +0000

Type Values Removed Values Added
Description The Ultimate Member Widgets for Elementor – WordPress User Directory plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the handle_filter_users function in all versions up to, and including, 2.3. This makes it possible for unauthenticated attackers to extract partial metadata of all WordPress users, including their first name, last name and email addresses.
Title Ultimate Member Widgets for Elementor <= 2.3 - Missing Authorization to Unauthenticated Information Exposure
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}


Subscriptions

Elementor Elementor
Userelements Ultimate Member Widgets For Elementor
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:14:03.604Z

Reserved: 2025-11-05T20:46:27.814Z

Link: CVE-2025-12778

cve-icon Vulnrichment

Updated: 2025-11-20T19:26:32.018Z

cve-icon NVD

Status : Deferred

Published: 2025-11-20T15:17:23.450

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-12778

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T01:30:24Z

Weaknesses