King Addons for Elementor CVE-2025-8489: Privilege Escalation Brief Summary

This post provides a brief summary of CVE-2025-8489, a critical privilege escalation vulnerability in the King Addons for Elementor WordPress plugin. We focus on affected versions, technical details, and vendor security history, with references for further reading.
CVE Analysis

8 min read

ZeroPath CVE Analysis

ZeroPath CVE Analysis

2025-10-30

King Addons for Elementor CVE-2025-8489: Privilege Escalation Brief Summary
Experimental AI-Generated Content

This CVE analysis is an experimental publication that is completely AI-generated. The content may contain errors or inaccuracies and is subject to change as more information becomes available. We are continuously refining our process.

If you have feedback, questions, or notice any errors, please reach out to us.

[email protected]

Introduction

Attackers can obtain full administrative access to WordPress sites running King Addons for Elementor by exploiting a privilege escalation flaw in versions 24.12.92 through 51.1.14. This vulnerability allows unauthenticated users to register as administrators, leading to total site compromise if exploited. King Addons for Elementor is a widely used extension for the Elementor page builder, with over 10,000 active installations. The plugin enables users to add widgets, templates, and features to WordPress sites without coding.

Technical Information

The vulnerability is rooted in the plugin's user registration handler, specifically in how it processes the user_role parameter during account creation. The handler is exposed via an AJAX endpoint and is accessible to unauthenticated users when public registration is enabled. In affected versions, the code does not properly restrict which roles can be assigned at registration. Instead, it accepts any role value provided by the client, including 'administrator'.

The vulnerable code pattern is as follows:

if (!empty($user_role) && $user_role !== 'subscriber') { $user_data['role'] = $user_role; } $user_id = wp_insert_user($user_data);

This logic means that if a POST request is sent to /wp-admin/admin-ajax.php with action=king_addons_user_register and user_role=administrator, the plugin will create a new administrator account. No authentication or special privileges are required to exploit this flaw. The only prerequisites are that public registration is enabled and the King Addons registration form is active on the site.

The patched version (51.1.37) introduces an allowlist, restricting registration to the 'subscriber' and 'customer' roles only.

Affected Systems and Versions

  • King Addons for Elementor plugin for WordPress
  • Versions 24.12.92 through 51.1.14 are vulnerable
  • Vulnerability is present when both public registration is enabled and the King Addons registration form is active

Vendor Security History

KingAddons.com has experienced multiple critical vulnerabilities in 2025, including privilege escalation and arbitrary file upload flaws in the same plugin. Patch response time for CVE-2025-8489 was approximately 47 days from initial disclosure to the release of a fix. The vendor's history indicates recurring issues with input validation and privilege management, suggesting limited security maturity in development practices.

References

Detect & fix
what others miss