Elementor Addon Vulnerability Exposes WordPress Sites to RCE
A critical local file inclusion (LFI) vulnerability, tracked as CVE-2026-1620, has been identified in the Livemesh Addons for Elementor plugin for WordPress. According to the National Vulnerability Database, all plugin versions up to and including 9.0 are affected. This flaw stems from insufficient input sanitization within the lae_get_template_part() function, where a bypassable str_replace() approach fails to adequately protect against recursive directory traversal patterns.
The vulnerability enables authenticated attackers with Contributor-level access or higher to include and execute arbitrary files on the server. The attack vector leverages the widget’s template parameter, allowing an attacker to achieve local file execution. A successful exploit typically requires tricking an administrator into performing a specific action or installing Elementor, paving the way for potential full compromise of the affected WordPress instance.
The National Vulnerability Database has assigned CVE-2026-1620 a CVSS score of 8.8, classifying it as HIGH severity. The CVSS vector CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H highlights the network-based attack vector, low attack complexity, low privileges required, and no user interaction needed for a successful exploit, leading to high impacts on confidentiality, integrity, and availability. This is a classic CWE-98 situation, where code injection via file inclusion is the name of the game.
What This Means For You
- If your environment is affected by CWE-98, patch immediately and audit logs for signs of exploitation. Monitor vendor advisories for CVE-2026-1620 updates and patches.
Related ATT&CK Techniques
🛡️ Detection Rules
3 rules · 6 SIEM formats3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
CVE-2026-1620 - Livemesh Addons for Elementor LFI Exploit Attempt
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-1620 | Local File Inclusion | Livemesh Addons for Elementor plugin for WordPress versions <= 9.0 |
| CVE-2026-1620 | Local File Inclusion | Insufficient sanitization of 'template name' parameter in `lae_get_template_part()` function |
| CVE-2026-1620 | Local File Inclusion | Bypassable `str_replace()` using recursive directory traversal patterns |
| CVE-2026-1620 | Local File Inclusion | Authenticated attackers with Contributor-level access or above |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | April 16, 2026 at 10:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.