Threat actors are actively targeting a vulnerability in the Elementor Pro plugin for WordPress to compromise websites, WordPress security company Defiant warned this week.
With an estimated install base of over 1 million websites, Elementor Pro is the paid version of the free Elementor plugin (which has more than 4 million users), a drag and drop page builder. Only Elementor Pro, which is available as a separate download, is impacted by the vulnerability.
Assessed with a CVSS score of 9.9, the vulnerability can be exploited by authenticated attackers to upload arbitrary files and execute code remotely on the affected websites.
When attacks were first spotted on May 6, this was a zero-day vulnerability, as attackers were already actively exploiting the flaw and a patch was not available for Elementor Pro users.
“An attacker able to remotely execute code on your site can install a backdoor or webshell to maintain access, gain full administrative access to WordPress, or even delete your site entirely,” Defiant explains.
Elementor released a patch for the vulnerability on May 7. Version 2.9.4 of Elementor Pro addresses the issue and users are advised to update immediately.
As part of the observed attacks, the threat actor is directly targeting the vulnerability on websites with open user registration.
If the site does not have user registration enabled, the attackers are attempting to exploit a recently patched vulnerability in the Ultimate Addons for Elementor plugin, which allows them to bypass registration and create subscriber accounts.
Next, leveraging the newly created accounts, the attackers are exploiting the Elementor Pro vulnerability to achieve remote code execution.
Ultimate Addons for Elementor version 1.24.2 addresses the registration bypass flaw and users are advised to update as soon as possible, especially if they use the plugin alongside Elementor Pro.
Admins are also advised to check their sites for any unknown subscriber-level users, and to search for files named “wp-xmlrpc.php” in their installations, which can be considered an indicator of compromise.
Furthermore, Defiant recommends deleting any unknown files or folders in the /wp-content/uploads/elementor/custom-icons/ directory, as these are a clear indicator of compromise, especially if a rogue subscriber-level account has also been created.
Related: Nearly 1 Million WordPress Sites Targeted via Old Vulnerabilities
Related: Flaws in Ninja Forms, LearnPress Plugins Exposed WordPress Sites to Attacks
Related: Code Injection Vulnerability Found in ‘Real-Time Find and Replace’ WordPress Plugin

More from Ionut Arghire
- Google Leads $16 Million Investment in Dope.security
- Critical WooCommerce Payments Vulnerability Leads to Site Takeover
- PoC Exploit Published for Just-Patched Veeam Data Backup Solution Flaw
- CISA Gets Proactive With New Pre-Ransomware Alerts
- CISA, NSA Issue Guidance for IAM Administrators
- Cisco Patches High-Severity Vulnerabilities in IOS Software
- ‘Nexus’ Android Trojan Targets 450 Financial Applications
- ‘Badsecrets’ Open Source Tool Detects Secrets in Many Web Frameworks
Latest News
- Intel Co-founder, Philanthropist Gordon Moore Dies at 94
- Google Leads $16 Million Investment in Dope.security
- US Charges 20-Year-Old Head of Hacker Site BreachForums
- Tesla Hacked Twice at Pwn2Own Exploit Contest
- CISA Ships ‘Untitled Goose Tool’ to Hunt for Microsoft Azure Cloud Infections
- Critical WooCommerce Payments Vulnerability Leads to Site Takeover
- PoC Exploit Published for Just-Patched Veeam Data Backup Solution Flaw
- CISA Gets Proactive With New Pre-Ransomware Alerts
