Impact
A flaw in Vertex Addons for Elementor up to version 1.6.4 allows any authenticated user with a Subscriber role or higher to install and activate arbitrary WordPress plugins through the activate_required_plugins function. The function performs a capability check that does not terminate the operation when the check fails, which leads to plugin installation and activation even for unauthorized users. This design flaw permits the introduction of malicious plugins that can execute arbitrary code, compromising confidentiality, integrity, and availability of the WordPress site.
Affected Systems
WordPress installations that have the Vertex Addons for Elementor plugin from the vendor Webilia, specifically all releases version 1.6.4 and earlier. Site administrators should verify that the plugin is not running the vulnerable code and review any unexpected plugin additions.
Risk and Exploitability
The vulnerability has a CVSS base score of 8.8, indicating high severity. The EPSS score is not available, and the issue is not listed in the CISA KEV catalog, but it can be exploited by any authenticated user who can reach the plugin’s AJAX endpoint. Based on the description, the attacker can submit crafted HTTP requests to the afeb_activate_required_plugins action to trigger arbitrary plugin installation and activation, leading to potential remote code execution.
OpenCVE Enrichment