CVE-2025-1639
Published: 04 March 2025
Summary
CVE-2025-1639 is a high-severity Missing Authorization (CWE-862) vulnerability in Crowdytheme Arolax. Its CVSS base score is 8.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 6.5% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and AC-6 (Least Privilege).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly prohibits or authorizes user-installed software, preventing authenticated low-privilege users from installing arbitrary plugins via the vulnerable function.
Enforces least privilege to ensure subscriber-level users lack capabilities for plugin installation and activation.
Mandates enforcement of approved authorizations, addressing the missing capability check in the install_elementor_plugin_handler() function.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability allows authenticated low-privilege (Subscriber) users to bypass authorization and install arbitrary plugins on a public-facing WordPress site, directly enabling exploitation of the application (T1190) for privilege escalation (T1068) to achieve backdoor deployment or further compromise.
NVD Description
The Animation Addons for Elementor Pro plugin for WordPress is vulnerable to unauthorized arbitrary plugin installation due to a missing capability check on the install_elementor_plugin_handler() function in all versions up to, and including, 1.6. This makes it possible for authenticated…
more
attackers, with Subscriber-level access and above, to install and activate arbitrary plugins which can be leveraged to further infect a victim when Elementor is not activated on a vulnerable site.
Deeper analysisAI
CVE-2025-1639 is a vulnerability in the Animation Addons for Elementor Pro plugin for WordPress that allows unauthorized arbitrary plugin installation due to a missing capability check in the install_elementor_plugin_handler() function. It affects all versions up to and including 1.6. The issue is classified under CWE-862 (Missing Authorization) with a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to its potential for confidentiality, integrity, and availability impacts.
Authenticated attackers with Subscriber-level access or higher can exploit this vulnerability over the network with low complexity and no user interaction required. By calling the vulnerable function, they can install and activate arbitrary plugins, enabling further compromise of the site, such as backdoor deployment or escalation, even on sites where Elementor is not activated.
Mitigation details are available in advisories referenced by the CVE, including Wordfence's threat intelligence report at https://www.wordfence.com/threat-intel/vulnerabilities/id/fb310bdb-fc74-47b2-9371-3d10abd287fb?source=cve and the plugin's ThemeForest page at https://themeforest.net/item/arolax-creative-digital-agency-theme/53547630. Security practitioners should update to a patched version beyond 1.6 and review access controls for low-privilege users.
Details
- CWE(s)