CVE-2023-35050
Description
Missing Authorization vulnerability in Elementor Elementor Pro.This issue affects Elementor Pro: from n/a through 3.13.0.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Elementor Pro <=3.13.0 lacks authorization checks, letting subscribers perform privileged actions; patched in 3.13.1.
Root
Cause
CVE-2023-35050 is a missing authorization vulnerability in the Elementor Pro plugin for WordPress, affecting versions up to and including 3.13.0. The flaw stems from broken access controls – specifically, the absence of proper authorization, authentication, or nonce token checks in certain functions. This allows an unprivileged user (e.g., a Subscriber) to execute actions that should require higher privileges, such as those reserved for Administrators or Editors [1].
Exploitation
Exploitation requires only a Subscriber-level account on a WordPress site running an affected version of Elementor Pro. There is no need for special network access or additional authentication. An attacker with such low-level credentials can leverage the missing authorization checks to perform actions normally restricted to higher roles. The vulnerability has been observed in mass-exploit campaigns, targeting thousands of websites regardless of their size or popularity [1].
Impact
Successful exploitation allows an authenticated attacker with low privileges to perform unauthorized actions, potentially leading to site defacement, data exposure, or further compromise depending on the specific privileged functions accessible. The CVSS v3 base score is 5.4 (Medium), indicating a moderate risk due to the low attack complexity and low privileges required, although the impact on confidentiality, integrity, and availability is considered low [1].
Mitigation
The vulnerability is patched in Elementor Pro version 3.13.1. Users are strongly advised to update immediately. For those unable to update, hosting providers or web developers should be consulted. Patchstack has also released a mitigation rule that blocks attacks until the patch is applied [1].
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1News mentions
0No linked articles in our index yet.