Royal Addons for Elementor – Addons and Templates Kit for Elementor…

Royal Addons for Elementor – Addons and Templates Kit for Elementor…

by | Mar 10, 2026 | Plugins

Attack Vectors

CVE-2025-13067 is a High-severity vulnerability (CVSS 8.8) affecting Royal Addons for Elementor – Addons and Templates Kit for Elementor (slug: royal-elementor-addons) in versions up to and including 1.7.1049.

The risk comes from an authenticated attacker who already has Author-level access or higher in WordPress. In many organizations, that can include employees, contractors, agencies, or compromised user accounts that legitimately publish content.

Once logged in with sufficient privileges, an attacker may be able to upload a file in a way that can lead to running unauthorized code on the server. This is not a “drive-by” attack; it is most likely to be exploited after credential theft, account takeover, or misuse of granted access.

Security Weakness

The plugin is vulnerable to arbitrary file upload due to insufficient file type validation related to how it handles files named main.php. The weakness allows a file with that name to bypass sanitization checks.

Because the control is bypassed by a specific filename condition, routine controls that rely on file extension/type checks may not prevent the upload in affected versions. This increases the chance that an attacker can place an unauthorized file on the server.

Remediation is straightforward: update Royal Addons for Elementor to version 1.7.1050 or newer, which contains the patch.

Technical or Business Impacts

If exploited, this issue may enable remote code execution, which can translate into full site compromise: defacement, malicious redirects, SEO spam, theft of data from the site or database, creation of backdoor admin accounts, or using the server as a foothold into other systems.

For marketing and revenue teams, the business outcomes can be immediate and measurable: lost conversions from downtime or browser warnings, brand damage if visitors are redirected to scams, ad spend waste if campaigns drive traffic to an infected site, and email deliverability issues if the domain reputation is harmed.

For executives and compliance stakeholders, impacts can include incident response costs, potential breach notification obligations depending on what data is exposed, contractual issues with partners, and audit findings if patch management and access controls are shown to be insufficient.

Similar Attacks: File upload and server-side execution weaknesses are commonly leveraged to gain persistent control of websites and web applications. Examples include CVE-2020-25213 (WordPress File Manager plugin), CVE-2017-5638 (Apache Struts, used in the Equifax breach), and CVE-2023-34362 (MOVEit Transfer).

Immediate risk reduction actions (in addition to patching) typically include reviewing who has Author+ access, enforcing strong authentication (especially for agency and contractor accounts), and monitoring for unexpected file changes. Source: Wordfence advisory; CVE record: CVE-2025-13067.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers