CVE-2026-2385

Plain English Summary

AI-powered analysis for quick understanding

This vulnerability allows an attacker to manipulate email routing and redirection settings in the Plus Addons for Elementor plugin, potentially sending unauthorized emails or redirecting users to malicious sites. It can be exploited by anyone without needing to log in, as the plugin does not properly verify the authenticity of the data it processes.

Technical Description

The The Plus Addons for Elementor – Addons for Elementor, Page Templates, Widgets, Mega Menu, WooCommerce plugin for WordPress is vulnerable to Insufficient Verification of Data Authenticity in all versions up to, and including, 6.4.7. This is due to the plugin decrypting and trusting attacker-controlled email_data in an unauthenticated AJAX handler without cryptographic authenticity guarantees. This makes it possible for unauthenticated attackers to tamper with form email routing and redirection values to trigger unauthorized email relay and attacker-controlled redirection via the 'email_data' parameter.

CVSS Vector Analysis

Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
Confidentiality ImpactNone
Integrity ImpactLow
Availability ImpactNone
ScopeUnchanged

Vector String

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References

Est. Bounty
$724($500-$1K)
Vendor Response
Grade APatched in 1 day

Quick Information

Published

Feb 22, 2026

about 2 months ago

Last Modified

Feb 23, 2026

about 2 months ago