Code Defence Cyber security

Critical Flaws in “King Addons” WordPress Plugin Expose 10,000+ Sites

Two critical vulnerabilities (CVE-2025-6327 & CVE-2025-6325) have been found in the “King Addons for Elementor” WordPress plugin, which is active on over 10,000 websites. The flaws allow for unauthenticated arbitrary file uploads and privilege escalation, leading to total site takeover.

Business Impact

An attacker can exploit these “trivially exploitable” flaws to upload a web shell, gain administrative control of the website, steal customer data, redirect traffic, or use the site to host malware or phishing pages, severely damaging the business’s reputation and security.

Why It Happened

The flaws stem from insecure code in the plugin’s AJAX and registration handlers, which fail to properly check user authentication and permissions before allowing critical actions like file uploads.

Recommended Executive Action

Direct your web operations or marketing teams to immediately update the King Addons plugin to the latest patched version. Implement a Web Application Firewall (WAF) to provide a virtual patch against such file upload vulnerabilities and conduct regular plugin security audits.

Hashtags: #WordPress #Plugin #Vulnerability #RCE #WebSecurity #CyberSecurity #PatchNow #CVE #InfoSec

Scroll to Top

Review My Order

0

Subtotal