Description
Inclusion of Functionality from Untrusted Control Sphere vulnerability in WP Royal Royal Elementor Addons royal-elementor-addons allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Royal Elementor Addons: from n/a through <= 1.7.1052.
Published: 2026-03-05
Score: 8.2 High
EPSS: < 1% Very Low
KEV: No
Impact: Privilege Escalation via Unrestricted Plugin Functionality
Action: Apply Patch
AI Analysis

Impact

An inclusion of functionality from the untrusted control sphere in the Royal Elementor Addons plugin permits attackers to invoke functions that are not properly constrained by access control lists. This flaw effectively allows unauthorized users to execute privileged operations within the WordPress site, potentially compromising site integrity. The vulnerability is rated high with a CVSS score of 8.2 and signals that any user with access to the plugin’s API could leverage the flaw.

Affected Systems

WordPress plugin WP Royal:Royal Elementor Addons, versions from any prior release through and including 1.7.1052.

Risk and Exploitability

The CVSS score of 8.2 indicates high severity, while the EPSS score of less than 1% reflects very low but non‑zero exploitation probability. The vulnerability is not listed in the CISA KEV catalog. The likely attack vector is remote web interaction with the plugin’s exposed functionality; an attacker could send crafted requests to trigger the unprotected actions, elevating privileges or gaining unauthorized access to sensitive operations. The combination of high impact and low exploitation likelihood suggests monitoring, but prompt remediation is still warranted.

Generated by OpenCVE AI on April 15, 2026 at 22:45 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Royal Elementor Addons to a version newer than 1.7.1052
  • Limit the plugin’s exposed functionality by disabling unused or unnecessary features
  • Implement or enforce role‑based access control checks for all plugin functions

Generated by OpenCVE AI on April 15, 2026 at 22:45 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Inclusion of Functionality from Untrusted Control Sphere vulnerability in WP Royal Royal Elementor Addons royal-elementor-addons allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Royal Elementor Addons: from n/a through <= 1.7.1049. Inclusion of Functionality from Untrusted Control Sphere vulnerability in WP Royal Royal Elementor Addons royal-elementor-addons allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Royal Elementor Addons: from n/a through <= 1.7.1052.
Title WordPress Royal Elementor Addons plugin <= 1.7.1049 - Other Vulnerability Type vulnerability WordPress Royal Elementor Addons plugin <= 1.7.1052 - Other vulnerability Type vulnerability

Tue, 10 Mar 2026 13:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 06 Mar 2026 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Wp Royal
Wp Royal royal Elementor Addons
Vendors & Products Wordpress
Wordpress wordpress
Wp Royal
Wp Royal royal Elementor Addons

Thu, 05 Mar 2026 06:15:00 +0000

Type Values Removed Values Added
Description Inclusion of Functionality from Untrusted Control Sphere vulnerability in WP Royal Royal Elementor Addons royal-elementor-addons allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Royal Elementor Addons: from n/a through <= 1.7.1049.
Title WordPress Royal Elementor Addons plugin <= 1.7.1049 - Other Vulnerability Type vulnerability
Weaknesses CWE-829
References

Subscriptions

Wordpress Wordpress
Wp Royal Royal Elementor Addons
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-01T14:15:49.803Z

Reserved: 2026-02-25T12:14:18.579Z

Link: CVE-2026-28135

cve-icon Vulnrichment

Updated: 2026-03-10T13:03:20.370Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-05T06:16:48.330

Modified: 2026-04-01T13:16:34.420

Link: CVE-2026-28135

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T23:00:10Z

Weaknesses