Description
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in bdthemes Element Pack Elementor Addons bdthemes-element-pack-lite allows Blind SQL Injection.This issue affects Element Pack Elementor Addons: from n/a through <= 8.4.2.
Published: 2026-04-15
Score: 7.6 High
EPSS: < 1% Very Low
KEV: No
Impact: Data Retrieval via Blind SQL Injection
Action: Apply Patch
AI Analysis

Impact

Incorrect sanitization of user input within the bdthemes Element Pack Elementor Addons plugin permits an attacker to inject malicious SQL into blind queries. This flaw allows read‑only access to the underlying database, potentially exposing sensitive information such as user credentials or content. The weakness is identified as CWE‑89: Improper Neutralization of Special Elements used in an SQL Command.

Affected Systems

WordPress installations that have the bdthemes Element Pack Elementor Addons plugin version 8.4.2 or earlier are affected. The issue persists across all sites that have the vulnerable plugin installed, regardless of theme or additional plugins. All versions from the initial release through 8.4.2 share the same vulnerable code paths.

Risk and Exploitability

The EPSS score of <1% (approximately 0.00021) and the fact that it is not listed in the CISA KEV catalog indicate that no publicly documented exploitation has been reported to date. The vulnerability exists in a public endpoint of the plugin, which means an attacker could potentially send crafted HTTP requests to trigger blind SQL queries. However, the exact likelihood of successful exploitation cannot be determined from the available data. Sites that allow unauthenticated access to the plugin’s request handling endpoint may be more susceptible, but the report does not specify any authentication or role-based restrictions that could mitigate the risk. The CVSS score of 7.6 indicates high severity, suggesting that successful exploitation could enable attackers to retrieve sensitive database information.

Generated by OpenCVE AI on April 15, 2026 at 22:23 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Element Pack Elementor Addons plugin to the latest release (8.5 or newer) that contains the SQL injection fix.
  • Restrict access to the plugin’s form or data submission endpoints to authenticated administrative users only, using HTTP authentication or IP whitelisting where possible.
  • Review and rotate database credentials in case they could have been accessed during the vulnerability window to limit potential data exposure.
  • Ensure that any custom database interactions in the WordPress site employ prepared statements and parameterized queries to prevent future injection flaws.

Generated by OpenCVE AI on April 15, 2026 at 22:23 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 15 Apr 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 15 Apr 2026 13:45:00 +0000

Type Values Removed Values Added
First Time appeared Bdthemes
Bdthemes element Pack Elementor Addons
Wordpress
Wordpress wordpress
Vendors & Products Bdthemes
Bdthemes element Pack Elementor Addons
Wordpress
Wordpress wordpress

Wed, 15 Apr 2026 10:45:00 +0000

Type Values Removed Values Added
Description Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in bdthemes Element Pack Elementor Addons bdthemes-element-pack-lite allows Blind SQL Injection.This issue affects Element Pack Elementor Addons: from n/a through <= 8.4.2.
Title WordPress Element Pack Elementor Addons plugin <= 8.4.2 - SQL Injection vulnerability
Weaknesses CWE-89
References

Subscriptions

Bdthemes Element Pack Elementor Addons
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-15T15:24:28.512Z

Reserved: 2026-04-15T09:19:38.195Z

Link: CVE-2026-40745

cve-icon Vulnrichment

Updated: 2026-04-15T15:24:02.380Z

cve-icon NVD

Status : Received

Published: 2026-04-15T11:16:36.533

Modified: 2026-04-15T16:16:38.480

Link: CVE-2026-40745

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T22:30:16Z

Weaknesses