CVE-2026-22350
Description
Missing Authorization vulnerability in add-ons.org PDF for Elementor Forms + Drag And Drop Template Builder pdf-for-elementor-forms allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects PDF for Elementor Forms + Drag And Drop Template Builder: from n/a through <= 6.3.1.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Missing Authorization in PDF for Elementor Forms plugin (≤6.3.1) allows unauthenticated attackers to perform unauthorized actions due to broken access control.
Vulnerability
The PDF for Elementor Forms plugin for WordPress, versions ≤6.3.1, suffers from a missing authorization vulnerability [1]. The plugin's access control security levels are incorrectly configured, allowing an attacker to exploit broken access control [1]. This type of flaw occurs when a function lacks proper authorization, authentication, or nonce token checks, enabling an unprivileged user to perform actions reserved for higher privileged users [1].
Exploitation
The attack surface is the WordPress admin interface; no authentication is needed to trigger the missing authorization vulnerability [1]. An attacker can exploit this by directly sending crafted requests to the vulnerable endpoints [1]. The plugin's broken access control makes it possible to bypass security restrictions without prior login [1].
Impact
An unauthenticated attacker can execute higher privileged actions, such as accessing or modifying sensitive plugin settings or data [1]. This could lead to unauthorized generation of PDF forms, data exposure, or other unintended operations within the Elementor form context [1]. The vulnerability is considered moderately dangerous and is expected to be used in mass-exploit campaigns against thousands of websites simultaneously [1].
Mitigation
The vendor has released version 6.5.0 which ** fixes the broken access control [1]. Users should update immediately to that version or use Patchstack's automatic mitigation rule to block attacks until updated [1]. No workaround is provided, so the only complete fixers is upgrading. Persons unable to update should consult their hosting provider or web developer for assistance [1]. References [1] .
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1- Range: <=6.3.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1News mentions
0No linked articles in our index yet.