Impact
The Essential Addons for Elementor plugin for WordPress suffers from a missing authorization flaw in the eael_product_quickview_popup routine. Unauthenticated callers can invoke this routine to retrieve WooCommerce product data for items that are in draft, pending, or private state, which should otherwise be hidden from public view. This vulnerability discloses confidential product details and constitutes a confidentiality breach, as classified under CWE‑862.
Affected Systems
WordPress sites running the Essential Addons for Elementor plugin from the wpdevteam under the name "Essential Addons for Elementor – Popular Elementor Templates & Widgets". Versions through and including 6.5.5 are affected.
Risk and Exploitability
The CVSS v3.1 score of 5.3 places the issue in the moderate range, while the EPSS score of less than 1% indicates a very low probability of exploitation in the general population. The vulnerability does not require any privileged state and can be triggered by unauthenticated HTTP requests to the plugin’s Ajax interface, likely via the eael_product_quickview_popup endpoint. Attackers could mass‑query product details on any site that has the plugin installed and exposed, thereby leaking private product information.
OpenCVE Enrichment