Impact
The plugin contains a missing capability check in the function that saves its compatibility setting. This flaw allows any logged‑in user with Subscriber or higher access to change the plugin’s compatibility option. The change does not grant direct code execution or full administrative rights, but it permits unauthorised configuration changes that could alter site appearance or functionality and serve as a foothold for further compromise.
Affected Systems
WordPress installations running the Ultimate Addons for Elementor (formerly Elementor Header & Footer Builder) plugin version 2.4.6 or older. The vulnerability applies to all supported installation paths for these versions.
Risk and Exploitability
The CVSS score of 4.3 indicates moderate severity, while the EPSS score of less than 1% suggests a very low likelihood of exploitation today. The flaw is not listed in the CISA KEV catalog. Attackers would need to authenticate to the WordPress site with at least Subscriber role; the vulnerability is accessed through the normal admin interface, after which the unauthorized update can be performed without additional conditions.
OpenCVE Enrichment
EUVD