Happy Addons for Elementor Vulnerability (Medium) – CVE-2026-2918

Happy Addons for Elementor Vulnerability (Medium) – CVE-2026-2918

by | Mar 10, 2026 | Plugins

Attack Vectors

Product: Happy Addons for Elementor (slug: happy-elementor-addons)
Vulnerability: CVE-2026-2918
Severity: Medium (CVSS 6.4, CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N)

This issue affects Happy Addons for Elementor versions 3.21.0 and below. An attacker must be authenticated (Contributor role or higher). From there, they can target WordPress sites that use the plugin by interacting with specific AJAX actions used to manage template conditions.

Because the attack is performed over the network and does not require user interaction (per the CVSS vector), it can be executed quietly once an attacker has obtained any eligible account (for example, through password reuse, credential stuffing, or an overly permissive user invitation process).

Reference: CVE-2026-2918 record and Wordfence advisory.

Security Weakness

The vulnerability combines an Insecure Direct Object Reference (IDOR) with an avenue that can lead to stored cross-site scripting (XSS) through template condition functionality.

According to the published details, the ha_condition_update AJAX action relies on a validation method that uses current_user_can('edit_posts', $template_id) instead of current_user_can('edit_post', $template_id). This is significant because it can fail to enforce object-level authorization—in other words, checking whether the user is allowed to edit that specific template.

Additionally, the ha_get_current_condition AJAX action is described as lacking a capability check. Taken together, these authorization gaps can allow a Contributor+ attacker to access or modify template condition data in ways they should not be able to, increasing the risk of unauthorized changes and stored XSS being introduced through the template conditions workflow.

Remediation: Update Happy Addons for Elementor to version 3.21.1 or newer patched version.

Technical or Business Impacts

For business leaders, the practical risk is not just “a bug,” but the possibility of unauthorized content or behavior changes on customer-facing pages. If an authenticated Contributor-level account is compromised (or misused), an attacker may be able to change how templates display and potentially inject content that persists (stored XSS), impacting site visitors and your brand.

Potential impacts include:

  • Brand and campaign damage: Unauthorized changes to landing pages, headers, popups, or template-driven components can disrupt active marketing campaigns, harm conversion rates, and erode trust.
  • Visitor-facing script injection risk: Stored XSS can be used to add malicious scripts that may redirect users, alter forms, or present convincing phishing prompts—especially damaging for lead-gen and eCommerce sites.
  • Compliance and reporting exposure: Even “low” confidentiality/integrity impact ratings can create compliance headaches if visitors are exposed to malicious content, particularly for regulated industries or organizations with strict vendor/security requirements.
  • Operational cost: Incident response time, emergency maintenance windows, content rollback, and stakeholder communications can quickly exceed the cost of routine patching.

Similar attacks (real examples): Authorization and content-injection issues have repeatedly led to real-world CMS incidents, including WordPress REST API content injection (CVE-2017-5487) and a WordPress core stored XSS issue (CVE-2019-8942).

What to do now: Patch immediately (update to Happy Addons for Elementor 3.21.1+), review who has Contributor access (and whether it’s truly required), and audit recent template condition changes for unexpected modifications. If your organization relies on WordPress for lead generation or revenue, treat this Medium severity issue as a meaningful business risk because it can be triggered by low-privilege accounts and can affect public-facing pages.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers