CVE-2025-8488
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-08-02

Last updated on: 2025-08-04

Assigner: Wordfence

Description
The Ultimate Addons for Elementor (Formerly Elementor Header & Footer Builder) plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the save_hfe_compatibility_option_callback ()function in all versions up to, and including, 2.4.6. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update the compatibility option setting.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-08-02
Last Modified
2025-08-04
Generated
2026-05-06
AI Q&A
2025-08-02
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
wordpress wordpress *
ultimate_addons header_footer_elementor *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-862 The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in the Ultimate Addons for Elementor WordPress plugin (up to version 2.4.6) where a missing capability check in the save_hfe_compatibility_option_callback() function allows authenticated users with Subscriber-level access or higher to modify a compatibility option setting without proper authorization. Essentially, users with low-level access can update plugin settings they should not be able to change.


How can this vulnerability impact me? :

The vulnerability allows authenticated users with minimal privileges (Subscriber-level) to modify plugin compatibility options. This unauthorized modification can lead to potential misconfigurations or unexpected behavior in the plugin, which might affect site functionality or security posture. Although it does not directly allow code execution or data disclosure, it can be leveraged to alter plugin settings in unintended ways.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability involves unauthorized modification of data via the save_hfe_compatibility_option_callback() function in versions up to 2.4.6 of the Ultimate Addons for Elementor plugin. Detection can focus on monitoring for unauthorized AJAX requests targeting this function or unusual changes to the compatibility option setting. Since the plugin uses AJAX actions with nonce and capability checks, you can inspect WordPress logs or use tools to monitor POST requests to admin-ajax.php with parameters related to 'save_hfe_compatibility_option_callback'. Additionally, checking the plugin version installed on your WordPress site can help detect vulnerability presence. Specific commands are not provided in the resources.


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include updating the Ultimate Addons for Elementor plugin to version 2.4.7 or later, where proper capability checks and nonce verifications are implemented to prevent unauthorized modifications. Until the update is applied, restrict Subscriber-level user permissions to prevent exploitation. Also, monitor and restrict AJAX requests related to plugin settings modifications. Applying principle of least privilege and ensuring only trusted users have access can reduce risk. [1, 2]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart