Impact
The plugin allows unauthenticated users to upload files through the form builder because the file type validation is incomplete. Only a limited set of extensions is blocked, leaving dangerous extensions such as .phar or .phtml able to be uploaded. When such a file is stored on the server it can be executed, leading to remote code execution.
Affected Systems
Any WordPress installation using Piotnet Addons For Elementor Pro version 7.1.70 or earlier is affected. The vulnerability exists in all releases up to and including 7.1.70.
Risk and Exploitability
The CVSS score of 9.8 indicates a critical flaw. EPSS is not available, so the actual likelihood of exploitation is unknown, but the flaw is listed as not yet in the CISA KEV catalog. An attacker only needs to submit a form containing a file field, which is unauthenticated. The missing validation allows the upload of files that can be executed by the server, making this a high‑risk, easy‑to‑exploit vulnerability.
OpenCVE Enrichment