Description
The Happy Addons for Elementor plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 3.21.0 via the `ha_duplicate_thing` admin action handler. This is due to the `can_clone()` method only checking `current_user_can('edit_posts')` (a general capability) without performing object-level authorization such as `current_user_can('edit_post', $post_id)`, and the nonce being tied to the generic action name `ha_duplicate_thing` rather than to a specific post ID. This makes it possible for authenticated attackers, with Contributor-level access and above, to clone any published post, page, or custom post type by obtaining a valid clone nonce from their own posts and changing the `post_id` parameter to target other users' content. The clone operation copies the full post content, all post metadata (including potentially sensitive widget configurations and API tokens), and taxonomies into a new draft owned by the attacker.
Published: 2026-03-11
Score: 5.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized Post Duplication & Sensitive Data Exposure
Action: Apply Patch
AI Analysis

Impact

The vulnerability in Happy Addons for Elementor arises from an Insecure Direct Object Reference (IDOR) in the admin action handler 'ha_duplicate_thing'. The can_clone() method verifies only that the user has the generic capability 'edit_posts', but it fails to confirm that the user has edit permission for the specific target post. Additionally, the nonce is bound to the generic action name instead of the post ID. This allows any authenticated user with Contributor-level privileges or higher to obtain a valid clone nonce from their own posts, change the post_id parameter, and clone any published post, page, or custom post type. The clone operation copies the full post content, all metadata including potentially sensitive widget configurations and API tokens, and taxonomies into a new draft owned by the attacker, leading to confidential data exposure and content tampering. This flaw is identified as CWE-639.

Affected Systems

All installed instances of the Happy Addons for Elementor plugin for WordPress up to and including version 3.21.0, provided by the vendor thehappymonster, are affected. The plugin versions 3.21.1 and newer are not impacted.

Risk and Exploitability

The CVSS score is 5.4, indicating moderate severity; the EPSS score is below 1%, implying a low probability of exploitation in the wild at present. The vulnerability is not listed in the CISA KEV catalog. Attackers must be authenticated and possess at least Contributor-level capabilities to exploit the issue. They can simply retrieve a clone nonce from one of their own posts and modify the post_id parameter to target an arbitrary post. Once cloned, the attacker can publish or edit the newly created draft, potentially escalating the damage. Because no privilege escalation is involved, the threat is primarily to confidentiality and integrity of content rather than system access.

Generated by OpenCVE AI on March 17, 2026 at 15:32 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Happy Addons for Elementor to version 3.21.1 or newer.
  • Limit Contributor users to only the necessary capabilities; remove the 'edit_posts' capability if not required.
  • Verify that post duplication requires 'edit_post' permission for the specific post ID.
  • Monitor the WordPress admin dashboard for unauthorized draft clones.
  • Check the vendor’s security advisories for any further patches or updates.

Generated by OpenCVE AI on March 17, 2026 at 15:32 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 12 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Thehappymonster
Thehappymonster happy Addons For Elementor
Wordpress
Wordpress wordpress
Vendors & Products Thehappymonster
Thehappymonster happy Addons For Elementor
Wordpress
Wordpress wordpress

Wed, 11 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 11 Mar 2026 08:00:00 +0000

Type Values Removed Values Added
Description The Happy Addons for Elementor plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 3.21.0 via the `ha_duplicate_thing` admin action handler. This is due to the `can_clone()` method only checking `current_user_can('edit_posts')` (a general capability) without performing object-level authorization such as `current_user_can('edit_post', $post_id)`, and the nonce being tied to the generic action name `ha_duplicate_thing` rather than to a specific post ID. This makes it possible for authenticated attackers, with Contributor-level access and above, to clone any published post, page, or custom post type by obtaining a valid clone nonce from their own posts and changing the `post_id` parameter to target other users' content. The clone operation copies the full post content, all post metadata (including potentially sensitive widget configurations and API tokens), and taxonomies into a new draft owned by the attacker.
Title Happy Addons for Elementor <= 3.21.0 - Insecure Direct Object Reference to Authenticated (Contributor+) Post Duplication via 'post_id' Parameter
Weaknesses CWE-639
References
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}


Subscriptions

Thehappymonster Happy Addons For Elementor
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-03-11T13:50:03.782Z

Reserved: 2026-02-20T20:58:53.545Z

Link: CVE-2026-2917

cve-icon Vulnrichment

Updated: 2026-03-11T13:49:57.248Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-11T08:16:03.367

Modified: 2026-03-11T13:52:47.683

Link: CVE-2026-2917

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-20T14:37:36Z

Weaknesses