CVE-2026-2385
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows an attacker to manipulate email routing and redirection settings in the Plus Addons for Elementor plugin, potentially sending unauthorized emails or redirecting users to malicious sites. It can be exploited by anyone without needing to log in, as the plugin does not properly verify the authenticity of the data it processes.
Technical Description
The The Plus Addons for Elementor – Addons for Elementor, Page Templates, Widgets, Mega Menu, WooCommerce plugin for WordPress is vulnerable to Insufficient Verification of Data Authenticity in all versions up to, and including, 6.4.7. This is due to the plugin decrypting and trusting attacker-controlled email_data in an unauthenticated AJAX handler without cryptographic authenticity guarantees. This makes it possible for unauthenticated attackers to tamper with form email routing and redirection values to trigger unauthorized email relay and attacker-controlled redirection via the 'email_data' parameter.
CVSS Vector Analysis
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:NExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Feb 22, 2026
about 2 months ago
Last Modified
Feb 23, 2026
about 2 months ago