<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Royal Elementor Addons &lt;= 1.7.1057 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/royal-elementor-addons--1.7.1057/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 08 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/royal-elementor-addons--1.7.1057/feed.xml" rel="self" type="application/rss+xml"/><item><title>Royal Elementor Addons Plugin SSRF Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-royal-elementor-ssrf/</link><pubDate>Mon, 08 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-royal-elementor-ssrf/</guid><description>The Royal Elementor Addons plugin for WordPress is vulnerable to Server-Side Request Forgery (SSRF) allowing authenticated attackers with Contributor-level access or higher to make arbitrary requests and retrieve sensitive information from internal services.</description><content:encoded><![CDATA[<p>The Royal Elementor Addons plugin, a popular WordPress extension, contains a Server-Side Request Forgery (SSRF) vulnerability (CVE-2026-6229) in versions up to and including 1.7.1057. This flaw stems from inadequate validation of user-provided URLs within the <code>render_csv_data()</code> function. Attackers can bypass the validation by including &lsquo;docs.google.com/spreadsheets&rsquo; in a query parameter. The vulnerability is triggered because the plugin uses these URLs in <code>fopen()</code> calls without implementing adequate safeguards to prevent access to internal or private network addresses. This vulnerability enables authenticated attackers with Contributor-level access or higher to craft malicious requests, potentially exposing sensitive internal data. Successful exploitation allows attackers to probe internal network resources, access configuration files, and potentially escalate attacks further.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker authenticates to the WordPress site with Contributor-level access or higher.</li>
<li>The attacker crafts a malicious HTTP request targeting the vulnerable <code>render_csv_data()</code> function within the Royal Elementor Addons plugin.</li>
<li>The malicious request includes a user-supplied URL containing &lsquo;docs.google.com/spreadsheets&rsquo; within a query parameter to bypass initial validation checks.</li>
<li>The plugin&rsquo;s <code>render_csv_data()</code> function receives the crafted URL without proper sanitization or validation against internal or private network addresses.</li>
<li>The <code>fopen()</code> function is called with the attacker-controlled URL, initiating an outbound request from the WordPress server.</li>
<li>If the URL points to an internal resource, the WordPress server retrieves the resource content.</li>
<li>The attacker receives the content of the internal resource in the response from the WordPress server.</li>
<li>The attacker analyzes the retrieved content for sensitive information, such as configuration files, API keys, or internal service details.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SSRF vulnerability (CVE-2026-6229) can lead to the exposure of sensitive internal information, potentially impacting all organizations using the Royal Elementor Addons plugin for WordPress version 1.7.1057 and below. This may include internal configuration files, API keys, database credentials, or other sensitive data accessible through internal services. The severity is high due to the potential for attackers to pivot from this vulnerability and further compromise the WordPress server or the internal network.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Royal Elementor Addons plugin to a version higher than 1.7.1057 to patch CVE-2026-6229.</li>
<li>Deploy the Sigma rule &ldquo;Detect Royal Elementor Addons SSRF Attempt via URL Parameter&rdquo; to identify malicious requests targeting the <code>render_csv_data()</code> function in your web server logs.</li>
<li>Implement strict network segmentation and firewall rules to limit access from the WordPress server to internal resources, mitigating the impact of potential SSRF vulnerabilities.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>wordpress</category><category>ssrf</category><category>cve-2026-6229</category><category>plugin</category></item></channel></rss>