PT-2026-36593 · Wproyal · Royal Addons For Elementor – Addons/Templates Kit For Elementor
Nguyen C
·
Published
2026-05-02
·
Updated
2026-05-02
·
CVE-2026-4024
CVSS v3.1
5.3
Medium
| Vector | AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N |
The Royal Addons for Elementor plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the
wpr update form action meta AJAX action in all versions up to, and including, 1.7.1056. The handler is registered on both wp ajax and wp ajax nopriv hooks, making it accessible to unauthenticated users. Although a nonce is verified, the nonce (wpr-addons-js) is publicly exposed in frontend JavaScript via WprConfig.nonce on any page that loads Royal Addons widgets, rendering the protection ineffective. The endpoint also lacks any capability or ownership checks and directly calls update post meta() with user-controlled input on a whitelisted set of form action meta keys. This makes it possible for unauthenticated attackers to modify form action configuration metadata (email, submissions, Mailchimp, and webhook settings) on any post, potentially leading to webhook/email action tampering and data exfiltration via modified webhook URLs.Fix
Missing Authorization
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Royal Addons For Elementor – Addons/Templates Kit For Elementor