Elementor’s Reign of Errors: King Addons Plugin Vulnerabilities Exposed!
King Addons for Elementor, used on over 10,000 WordPress sites, has two critical vulnerabilities that could lead to a complete site takeover. The file upload flaw allows any visitor to pop unwanted files into your site, while the privilege escalation bug lets attackers create accounts with top-tier access. Update immediately, or risk a surprise guest appearance!

Hot Take:
In a twist worthy of a daytime soap opera, your trusty website sidekick, the King Addons for Elementor plugin, has been caught with its digital pants down, sporting not one but two critical vulnerabilities. It’s a classic tale of love, betrayal, and unauthenticated file uploads. Who knew building contact forms could be this scandalous?
Key Points:
- The King Addons for Elementor plugin faces two critical vulnerabilities that can lead to a complete site takeover.
- These vulnerabilities include an unauthenticated arbitrary file upload flaw and a privilege escalation via registration endpoint.
- The file upload flaw allows attackers to place files in web-accessible directories due to a lax nonce and faulty validation.
- Privilege escalation permits attackers to create accounts with arbitrary roles, up to administrator level.
- Immediate updates to version 51.1.37 are recommended to patch these vulnerabilities and secure the site.
Elementor’s Royal Scandal
In the realm of WordPress plugins, the King Addons for Elementor was thought to be a noble and trustworthy tool. Alas, even royalty is not immune to a scandal or two. Patchstack’s latest research has unveiled not one, but two vulnerabilities that could make any site owner’s blood pressure rival that of a boiling kettle. With over 10,000 sites potentially at risk, it seems King Addons has been ruling with a shaky scepter.
File Upload Fiasco
The first vulnerability is an unauthenticated arbitrary file upload flaw, known as CVE-2025-6327. This exploit allows attackers to sneakily upload files into web-accessible directories with all the stealth of a cat burglar in a heist movie. The root of this villainy lies in an AJAX handler, which generously offers a nonce to every visitor like it’s Oprah giving away cars. The validation method, which should have been the gatekeeper, was more of a friendly doorman, letting everyone in with a smile.
Privilege Escalation Exploit
The second vulnerability is a privilege escalation flaw, affectionately dubbed CVE-2025-6325, that allows attackers to create accounts with any role they fancy, including, you guessed it, administrator. This stems from a registration handler that’s a bit too trusting, accepting client-supplied roles like a parent accepting a child’s request for ice cream for dinner. Once the King Addons Register widget was enabled, it was open season for anyone wanting to play king for a day.
All Hail the Patch
Fear not, dear site administrators, for there is a silver lining to this tale of digital betrayal. The developers of King Addons have rolled out version 51.1.37, the hero we all need right now. This patched release is the digital equivalent of a royal decree, closing the doors on both the file upload and privilege escalation vulnerabilities. It introduces a role allowlist and input sanitization, ensuring new accounts are confined to safe roles like subscriber and customer, and the upload handler now demands proper permissions like a bouncer at an exclusive club.
Time to Update
If you’re using the King Addons for Elementor plugin, it’s time to put on your superhero cape and save the day by updating to version 51.1.37 immediately. Check whether the “King Addons Login | Register Form” widget is active on any of your pages. Remember, these vulnerabilities are as easy to exploit as a toddler is to distract with a shiny object, so don’t delay. After all, keeping your site secure is no laughing matter, unless you’re reading this article, of course.
So, to sum up, while it might be tempting to go for a quick DIY fix, trust us when we say, let the professionals handle this one. Update your plugin, tighten those security belts, and let’s keep your castle – err, website – safe from digital dragons and other nefarious threats. Until next time, may your uploads be secure and your roles appropriately assigned!
