
Cloud Vulnerability DB
A community-led vulnerabilities database
A Server-Side Request Forgery (SSRF) vulnerability was discovered in TheInnovs Team ElementsCSS Addons for Elementor plugin, affecting versions through 1.0.8.7. The vulnerability was initially reported on January 19, 2025, by Tran Nguyen Bao Khanh from VCI-VNPT and was publicly disclosed on April 1, 2025. This security issue is tracked as CVE-2025-31796 and affects the WordPress plugin ecosystem (Patchstack).
The vulnerability is classified as a Server-Side Request Forgery (SSRF) issue, identified as CWE-918. It received a CVSS v3.1 base score of 5.4 (Medium) with the vector string CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N. The vulnerability is particularly concerning as it can be exploited without authentication, though it requires high attack complexity (NVD).
The vulnerability could enable malicious actors to execute website requests to arbitrary domains of their choosing. This capability could potentially lead to the discovery of sensitive information about other services running on the affected system. The impact is particularly significant as the software is considered abandoned, having not received updates for over a year (Patchstack).
Given that the software is abandoned and no official fix is available, the primary recommendation is to remove and replace the ElementsCSS Addons for Elementor plugin with an alternative solution. It's important to note that merely deactivating the software does not remove the security threat unless a virtual patch is deployed (Patchstack).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."