Impact
The Premium Addons for Elementor plugin contains a flaw in its get_template_content function where a required capability check is missing. Because this check is not performed, any visitor to the site can request the content of templates that are marked as private, draft or pending. The flaw therefore allows the disclosure of confidential design details and metadata stored in these templates, compromising the confidentiality of template data.
Affected Systems
WordPress installations that have the leap13 Premium Addons for Elementor plugin installed, specifically any version up to and including 4.11.53, are affected. Installations using newer versions of the plugin are not impacted.
Risk and Exploitability
The CVSS score of 5.3 indicates a moderate severity level for this vulnerability. The EPSS score is reported as less than 1%, suggesting that the likelihood of exploitation is currently low. The vulnerability is not listed in CISA's KEV catalog, and no publicly documented exploits exist as of the available information. An attacker can typically trigger the flaw by sending a simple HTTP request to the endpoint that invokes get_template_content, making the attack vector remote and unauthenticated. Since the flaw permits disclosure rather than privilege escalation, the impact is limited to information leakage.
OpenCVE Enrichment