Elementor Addon Vulnerability Exposes WordPress Sites to RCE

Elementor Addon Vulnerability Exposes WordPress Sites to RCE

A critical local file inclusion (LFI) vulnerability, tracked as CVE-2026-1620, has been identified in the Livemesh Addons for Elementor plugin for WordPress. According to the National Vulnerability Database, all plugin versions up to and including 9.0 are affected. This flaw stems from insufficient input sanitization within the lae_get_template_part() function, where a bypassable str_replace() approach fails to adequately protect against recursive directory traversal patterns.

The vulnerability enables authenticated attackers with Contributor-level access or higher to include and execute arbitrary files on the server. The attack vector leverages the widget’s template parameter, allowing an attacker to achieve local file execution. A successful exploit typically requires tricking an administrator into performing a specific action or installing Elementor, paving the way for potential full compromise of the affected WordPress instance.

The National Vulnerability Database has assigned CVE-2026-1620 a CVSS score of 8.8, classifying it as HIGH severity. The CVSS vector CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H highlights the network-based attack vector, low attack complexity, low privileges required, and no user interaction needed for a successful exploit, leading to high impacts on confidentiality, integrity, and availability. This is a classic CWE-98 situation, where code injection via file inclusion is the name of the game.

What This Means For You

  • If your environment is affected by CWE-98, patch immediately and audit logs for signs of exploitation. Monitor vendor advisories for CVE-2026-1620 updates and patches.

Related ATT&CK Techniques

🛡️ Detection Rules

3 rules · 6 SIEM formats

3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.

critical T1190 Initial Access

CVE-2026-1620 - Livemesh Addons for Elementor LFI Exploit Attempt

Sigma YAML — free preview
✓ Sigma · Splunk SPL Sentinel KQL Elastic QRadar AQL Wazuh Export via Bot →

Indicators of Compromise

IDTypeIndicator
CVE-2026-1620 Local File Inclusion Livemesh Addons for Elementor plugin for WordPress versions <= 9.0
CVE-2026-1620 Local File Inclusion Insufficient sanitization of 'template name' parameter in `lae_get_template_part()` function
CVE-2026-1620 Local File Inclusion Bypassable `str_replace()` using recursive directory traversal patterns
CVE-2026-1620 Local File Inclusion Authenticated attackers with Contributor-level access or above
Source & Attribution
Source PlatformNVD
ChannelNational Vulnerability Database
PublishedApril 16, 2026 at 10:16 UTC

This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.

Believe this infringes your rights? Submit a takedown request.

Related Posts

CVE-2026-41254 — Integer Overflow

CVE-2026-41254 — Little CMS (lcms2) through 2.18 has an integer overflow in CubeSize in cmslut.c because the overflow check is performed after the multiplication.

vulnerabilityCVEmedium-severityinteger-overflowcwe-696
/SCW Vulnerability Desk /MEDIUM /⚑ 2 IOCs /⚙ 1 Sigma

CVE-2026-41253 — Code Execution

CVE-2026-41253 — In iTerm2 through 3.6.9, displaying a .txt file can cause code execution via DCS 2000p and OSC 135 data, if the working directory...

vulnerabilityCVEmedium-severitycode-executioncwe-829
/SCW Vulnerability Desk /MEDIUM /⚑ 2 IOCs /⚙ 2 Sigma

Mirai Botnet Variants Target TBK DVRs via CVE-2024-3721

Mirai botnet variants, including Nexcorium, are actively exploiting a command injection vulnerability (CVE-2024-3721) in TBK DVR devices. This flaw, rated medium severity, allows attackers to...

threat-intelvulnerabilitymalwarecloud
/SCW Vulnerability Desk /HIGH /⚑ 1 IOC /⚙ 3 Sigma