Description
Missing Authorization vulnerability in Element Invader ElementInvader Addons for Elementor elementinvader-addons-for-elementor allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects ElementInvader Addons for Elementor: from n/a through <= 1.4.1.
Published: 2026-02-03
Score: 5.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized access via broken access control
Action: Immediate Patch
AI Analysis

Impact

This vulnerability is a missing authorization flaw that allows attackers to bypass the plugin’s access control mechanisms and gain unrestricted access to its administrative functions. The flaw arises from incorrectly configured security levels within the ElementInvader Addons for Elementor, enabling any user to perform actions intended for privileged administrators. The resulting impact includes potential theft or modification of site content and configuration, thereby compromising confidentiality, integrity, and availability of the WordPress installation. The weakness is identified as CWE‑862, which categorizes it as a broken access control issue.

Affected Systems

Element Invader – ElementInvader Addons for Elementor, affecting all installations of the plugin version 1.4.1 and earlier. No specific WordPress core versions are mentioned, but the plugin is applicable to any WordPress site that has installed the vulnerable add‑ons.

Risk and Exploitability

The CVSS score of 5.4 indicates moderate severity, while the EPSS score of less than 1% suggests a low likelihood of exploitation in the wild. The CVE is not listed in the CISA KEV catalog, further indicating low exploitation activity. The attack vector is inferred to be a web‑based exploit, likely through plugin‑provided endpoints or administrative interfaces that lack proper capability checks. An attacker only needs to reach the affected WordPress instance and could exploit the weakness without prior authentication, depending on the implementation of the plugin’s permission checks.

Generated by OpenCVE AI on April 16, 2026 at 01:08 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade ElementInvader Addons for Elementor to the latest version that includes the fix for broken access control.
  • If a patch is not yet available, restrict plugin administrative pages so that only administrators or users with the "manage_options" capability can access them.
  • Review and harden role‑based permissions for all users to ensure no extra capabilities are granted to non‑admin accounts.

Generated by OpenCVE AI on April 16, 2026 at 01:08 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 05 Feb 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 04 Feb 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Elementinvader
Elementinvader elementinvader Addons For Elementor
Wordpress
Wordpress wordpress
Vendors & Products Elementinvader
Elementinvader elementinvader Addons For Elementor
Wordpress
Wordpress wordpress

Tue, 03 Feb 2026 14:30:00 +0000

Type Values Removed Values Added
Description Missing Authorization vulnerability in Element Invader ElementInvader Addons for Elementor elementinvader-addons-for-elementor allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects ElementInvader Addons for Elementor: from n/a through <= 1.4.1.
Title WordPress ElementInvader Addons for Elementor plugin <= 1.4.1 - Broken Access Control vulnerability
Weaknesses CWE-862
References

Subscriptions

Elementinvader Elementinvader Addons For Elementor
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-01T14:14:43.274Z

Reserved: 2026-01-28T09:52:08.057Z

Link: CVE-2026-25028

cve-icon Vulnrichment

Updated: 2026-02-05T14:36:32.408Z

cve-icon NVD

Status : Deferred

Published: 2026-02-03T15:16:21.163

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-25028

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T01:15:20Z

Weaknesses