Critical (10.0)

Wordpress Vulnerability (CVE-2026-23693)

CVE-2026-23693

ElementsKit Lite (elementskit-lite) WordPress plugin versions prior to 3.7.9 expose the REST endpoint /wp-json/elementskit/v1/widget/mailchimp/subscribe without authentication. The endpoint accepts cl...

Affected: WordPress

Overview

A critical security flaw has been identified in the ElementsKit Lite plugin for WordPress. This vulnerability allows any visitor to your website, without needing a login or password, to misuse a specific function of the plugin. This function is designed to connect to Mailchimp, a popular email marketing service.

Vulnerability Explained Simply

The plugin provides a feature for website visitors to subscribe to a Mailchimp email list. To make this work, the plugin needs to communicate with Mailchimp’s systems. However, in affected versions, the “door” to this communication channel was left completely unlocked.

An attacker can send specially crafted requests directly to this open door. Because the plugin does not properly verify who is sending the request or fully check the data being sent, the attacker can force the website to forward malicious instructions to Mailchimp. Essentially, your WordPress site can be used as an unauthorized relay or “open proxy” to the Mailchimp API.

Potential Impact

The consequences of this vulnerability are severe and multifaceted:

  • Unauthorized Mailchimp Access: Attackers can add, remove, or manipulate subscribers on your connected Mailchimp lists, damaging your marketing efforts and compliance.
  • API Quota Exhaustion: Attackers can make a high volume of requests, quickly using up your Mailchimp API call limits, which can disrupt legitimate service and incur costs.
  • Resource Abuse: The attack traffic can consume significant server resources (CPU, memory) on your WordPress hosting, potentially slowing down or crashing your site.
  • Further Exploitation: This open proxy could be used as a stepping stone for more complex attacks against your Mailchimp account or to hide the attacker’s true origin.

Remediation and Mitigation

Immediate action is required to secure affected websites.

  1. Update Immediately: The primary fix is to update the ElementsKit Lite plugin to version 3.7.9 or later. This update properly locks the vulnerable “door” by requiring authentication.
  2. Verify Update: In your WordPress admin dashboard, navigate to Plugins > Installed Plugins, find “ElementsKit Lite”, and confirm its version is 3.7.9 or higher.
  3. Temporary Mitigation (If Update is Delayed): If you cannot update immediately, you can disable the ElementsKit Lite plugin as a temporary measure. Be aware this may affect site functionality.
  4. Review Mailchimp Account: Log into your linked Mailchimp account and review your audience lists for any suspicious subscriber activity. Also, check your API usage logs for unexpected spikes.

All users of the ElementsKit Lite plugin should prioritize applying this update to prevent potential exploitation.

Share:

Never miss a critical vulnerability

Get real-time security alerts delivered to your preferred platform.

Related Advisories

Other WordPress Vulnerabilities

View all WordPress vulnerabilities →

Never Miss a Critical Alert

CVE advisories, breach reports, and threat intel — delivered daily to your inbox.