Thim Kit for Elementor – Pre-built Templates & Widgets for Elemento…

Thim Kit for Elementor – Pre-built Templates & Widgets for Elemento…

by | Mar 14, 2026 | Plugins

Attack Vectors

CVE-2026-1870 is a Medium severity vulnerability (CVSS 5.3) affecting Thim Kit for Elementor – Pre-built Templates & Widgets for Elementor (slug: thim-elementor-kit) in versions up to and including 1.3.7.

The exposure can be triggered remotely over the internet with no login required. An unauthenticated attacker can call the plugin’s REST endpoint thim-ekit/archive-course/get-courses and supply a post_status value in the request payload to retrieve private or draft LearnPress course content.

For business leaders, the key takeaway is that this is not a “theoretical” issue that depends on user clicks or insider access: it’s a straightforward, automated request that can be repeated at scale if the site is publicly reachable.

Security Weakness

The root cause is a missing authorization/validation check in the REST endpoint callback. In practical terms, the endpoint does not adequately confirm that the requester is allowed to view non-public course content before returning results.

Because the weakness sits in an API-style interface, it may not generate obvious “break-in” signals for non-technical teams. Content can be queried quietly, and the data may be collected without triggering the same alarms as a defacement or outage.

Remediation: Update the plugin to version 1.3.8 (or any newer patched version). Reference: Wordfence advisory. CVE record: CVE-2026-1870.

Technical or Business Impacts

If your organization uses LearnPress to manage paid, gated, partner-only, or pre-launch training, this vulnerability can create a direct path to content leakage. That can mean early exposure of course modules, pricing strategy, product positioning, or proprietary training materials—assets that marketing, sales enablement, and HR often treat as competitive differentiators.

Business risks include revenue loss (paid content effectively “given away”), brand and partner trust damage (private courses appearing in third-party channels), and compliance exposure if draft/private course areas include personal data or regulated training records embedded in course content. Even when the CVSS rating is Medium, the reputational impact can be high if the leaked material is sensitive or time-critical.

Recommended business actions after patching include: validating the update across all WordPress environments, reviewing access logs for unusual REST requests to the affected endpoint, confirming what content was marked private/draft during the exposure window, and documenting the remediation for audit/compliance needs.

Similar attacks (real-world examples): Missing or weak authorization checks in web APIs have caused major data exposure events, such as the Panera Bread customer data exposure via an insecure API, the Peloton user data exposure tied to API access controls, and the widely reported Facebook data scraping incident affecting hundreds of millions of records.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers