CVE-2022-4707
low-risk
Published 2023-01-10
The Royal Elementor Addons plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.3.59. This is due to missing nonce validation in the 'wpr_create_mega_menu_template' AJAX function. This allows unauthenticated attackers to create Mega Menu templates, granted they can trick an administrator into performing an action, such as clicking a link.
Do I need to act?
-
0.09% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
4
CVSS 4.3/10
Medium
NETWORK
/ LOW complexity
Affected Products (1)
Affected Vendors
References (6)
Third Party Advisory
https://plugins.trac.wordpress.org/browser/royal-elementor-addons/trunk/admin/me...
Third Party Advisory
https://www.wordfence.com/blog/2023/01/eleven-vulnerabilities-patched-in-royal-e...
Third Party Advisory
https://plugins.trac.wordpress.org/browser/royal-elementor-addons/trunk/admin/me...
Third Party Advisory
https://www.wordfence.com/blog/2023/01/eleven-vulnerabilities-patched-in-royal-e...
Third Party Advisory
https://www.wordfence.com/threat-intel/vulnerabilities/id/55db7d81-7ffb-49da-b64...
23
/ 100
low-risk
Severity
18/34 · Moderate
Exploitability
0/34 · Minimal
Exposure
5/34 · Minimal