WPZOOM Addons for Elementor – Starter Templates & Widgets Vulnerabi…

WPZOOM Addons for Elementor – Starter Templates & Widgets Vulnerabi…

by | Feb 11, 2026 | Plugins

Attack Vectors

CVE-2026-2295 affects the WordPress plugin WPZOOM Addons for Elementor – Starter Templates & Widgets (slug: wpzoom-elementor-addons) in versions up to and including 1.3.2, with a Medium severity rating (CVSS 5.3). The issue involves an AJAX endpoint tied to the ajax_post_grid_load_more function that can be reached without logging in.

From a business-risk perspective, this means an unauthenticated attacker could query the site in a way that causes the plugin to return content that was never intended to be public. Because the CVSS vector indicates no privileges and no user interaction (AV:N/PR:N/UI:N), this can be exploited remotely and silently, without needing an employee to click anything.

Security Weakness

The root weakness is a missing capability check on the plugin’s ajax_post_grid_load_more function in WPZOOM Addons for Elementor – Starter Templates & Widgets versions <= 1.3.2. In practical terms, the plugin does not adequately confirm that the requester is allowed to access certain post data before returning it.

As documented, this can enable unauthorized exposure of protected WordPress content states such as draft, scheduled (future), or pending posts—specifically titles and excerpts—content that leadership teams and compliance functions typically expect to remain internal until publication or approval.

Technical or Business Impacts

The primary impact is information disclosure (CVSS confidentiality impact is listed as low), but the business consequences can be meaningful. Protected titles and excerpts can reveal product roadmap details, unreleased campaigns, partnership announcements, regulated communications, or legal/compliance-sensitive messaging before they are approved.

For marketing directors and executives, this can translate into loss of launch control, competitive intelligence leakage, brand and PR risk, and potential compliance exposure if pre-release claims, pricing, or forward-looking statements become public prematurely. While the vulnerability description does not indicate content modification or site downtime, even limited data exposure can have outsized impact on reputation and stakeholder trust.

Remediation is straightforward: update WPZOOM Addons for Elementor – Starter Templates & Widgets to version 1.3.3 or newer to address CVE-2026-2295. More details are available in the CVE record (CVE-2026-2295) and the vendor/community advisory source (Wordfence vulnerability entry).

Similar Attacks

Unauthorized data exposure through missing permission checks is a common pattern in web applications and can affect many platforms. For context, here are a few real, well-documented examples of information exposure issues in the wild:

Equifax 2017 breach (widely cited example of large-scale data exposure impact on business trust and regulatory scrutiny).

FTC action involving Drizly (2022) (illustrates regulatory consequences tied to inadequate security controls and resulting exposure).

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers