Easy Elements for Elementor Plugin Privilege Escalation (CVE-2026-9018)
CVE-2026-9018 allows unauthenticated attackers to escalate privileges to administrator by exploiting a vulnerability in the Easy Elements for Elementor plugin, which lacks proper input validation during user registration.
The Easy Elements for Elementor – Addons & Website Templates plugin, versions 1.4.5 and below, contains a critical vulnerability (CVE-2026-9018) that allows unauthenticated attackers to gain administrator privileges on a WordPress site. This vulnerability stems from the easyel_handle_register() function, specifically within the wp_ajax_nopriv_eel_register AJAX handler. The handler fails to properly sanitize or validate the custom_meta POST array during user registration. An attacker can inject arbitrary key-value pairs into the user’s metadata, including the wp_capabilities key, effectively granting themselves administrator access. This exploit requires user registration to be enabled and the presence of the Login/Register widget on at least one page to expose the easy_elements_nonce.
Attack Chain
- The attacker identifies a WordPress site with the Easy Elements for Elementor plugin (<= 1.4.5) installed and user registration enabled.
- The attacker accesses a page containing the Login/Register widget.
- The attacker retrieves the
easy_elements_noncevalue from the page’s HTML source code via a GET request. - The attacker crafts a malicious POST request to
wp-admin/admin-ajax.phpwith the action set toeel_register. - The POST request includes user registration details (username, email, password) and a
custom_metaarray containingwp_capabilities[administrator]=1. - The
wp_ajax_nopriv_eel_registerAJAX handler processes the request, creating a new user account usingwp_insert_user(). - The handler then iterates through the
custom_metaarray, usingupdate_user_meta()to write the attacker-suppliedwp_capabilitiesvalue to the newly created user’s metadata, overwriting the default role. - The attacker logs in with the newly created account and now has full administrator privileges on the WordPress site.
Impact
Successful exploitation of CVE-2026-9018 grants unauthenticated attackers complete control over the affected WordPress website. This includes the ability to modify content, install malicious plugins, create new administrator accounts, access sensitive data, and potentially compromise the underlying server. The vulnerability poses a significant risk to any WordPress site using the vulnerable plugin versions where user registration is enabled.
Recommendation
- Immediately update the Easy Elements for Elementor – Addons & Website Templates plugin to the latest version to patch CVE-2026-9018.
- As a preventative measure, disable user registration on WordPress sites if it is not a required feature.
- Deploy the Sigma rule “Detect CVE-2026-9018 Exploitation Attempt via User Registration” to monitor for malicious user registration requests with manipulated
wp_capabilities. - Review user accounts for unexpected administrator privileges and investigate any anomalies.
Detection coverage 2
Detect CVE-2026-9018 Exploitation Attempt via User Registration
criticalDetects CVE-2026-9018 exploitation — Monitors POST requests to wp-admin/admin-ajax.php with eel_register action and attempts to set wp_capabilities to administrator.
Detect Easy Elements Nonce Retrieval
lowDetects attempts to retrieve the easy_elements_nonce, potentially as a preliminary step to exploiting CVE-2026-9018.
Detection queries are available on the platform. Get full rules →