Description
Cross-Site Request Forgery (CSRF) vulnerability in anantaddons Anant Addons for Elementor anant-addons-for-elementor allows Cross Site Request Forgery.This issue affects Anant Addons for Elementor: from n/a through <= 1.1.8.
Published: 2025-04-09
Score: 9.6 Critical
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability is a Cross‑Site Request Forgery flaw in the Anant Addons for Elementor plugin. Based on the description, it is inferred that the flaw allows an authenticated WordPress user to trigger the installation of any plugin without a proper CSRF token. This flaw, identified as CWE‑352, enables a malicious actor to supply a crafted plugin package that will be installed with the full privileges of the user performing the request.

Affected Systems

The flaw affects every release of the Anant Addons for Elementor plugin from the earliest version up through 1.1.8 inclusive. Versions 1.1.9 and newer contain the CSRF protection fix.

Risk and Exploitability

The EPSS score of less than 1% indicates a low probability of mass exploitation at present, yet the high CVSS suggests that a targeted attack could be devastating. Based on the description, the likely attack vector is an attacker delivering a forged request—such as a malicious link or form—to a logged‑in WordPress user; however, the CVE data does not explicitly confirm that an authenticated user is required. While no public exploit code exists, the logic is straightforward for an attacker with moderate skill, and the risk is magnified if a malicious plugin can execute code on the server. The vulnerability is not listed in the CISA KEV catalog.

Generated by OpenCVE AI on May 2, 2026 at 11:07 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Anant Addons for Elementor plugin to version 1.1.9 or later to eliminate the CSRF defect.
  • Enforce a CSRF token on all plugin installation requests and restrict the installation capability to administrators only.
  • Monitor site activity logs for unusual plugin‑installation activity and apply least‑privilege policies to reduce the potential impact of exploitation.

Generated by OpenCVE AI on May 2, 2026 at 11:07 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-10574 Cross-Site Request Forgery (CSRF) vulnerability in anantaddons Anant Addons for Elementor allows Cross Site Request Forgery. This issue affects Anant Addons for Elementor: from n/a through 1.1.5.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 9.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Cross-Site Request Forgery (CSRF) vulnerability in anantaddons Anant Addons for Elementor allows Cross Site Request Forgery. This issue affects Anant Addons for Elementor: from n/a through 1.1.5. Cross-Site Request Forgery (CSRF) vulnerability in anantaddons Anant Addons for Elementor anant-addons-for-elementor allows Cross Site Request Forgery.This issue affects Anant Addons for Elementor: from n/a through <= 1.1.8.
Title WordPress Anant Addons for Elementor plugin <= 1.1.5 - CSRF to Arbitrary Plugin Installation vulnerability WordPress Anant Addons for Elementor plugin <= 1.1.8 - CSRF to Arbitrary Plugin Installation vulnerability
References
Metrics cvssV3_1

{'score': 9.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H'}


Wed, 09 Apr 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 09 Apr 2025 16:30:00 +0000

Type Values Removed Values Added
Description Cross-Site Request Forgery (CSRF) vulnerability in anantaddons Anant Addons for Elementor allows Cross Site Request Forgery. This issue affects Anant Addons for Elementor: from n/a through 1.1.5.
Title WordPress Anant Addons for Elementor plugin <= 1.1.5 - CSRF to Arbitrary Plugin Installation vulnerability
Weaknesses CWE-352
References
Metrics cvssV3_1

{'score': 9.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:12:26.437Z

Reserved: 2025-04-09T11:20:57.809Z

Link: CVE-2025-32641

cve-icon Vulnrichment

Updated: 2025-04-09T17:40:31.804Z

cve-icon NVD

Status : Deferred

Published: 2025-04-09T17:15:49.540

Modified: 2026-04-23T15:29:15.957

Link: CVE-2025-32641

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-02T11:15:19Z

Weaknesses