Wordpress Vulnerability (CVE-2026-23693)
CVE-2026-23693
ElementsKit Lite (elementskit-lite) WordPress plugin versions prior to 3.7.9 expose the REST endpoint /wp-json/elementskit/v1/widget/mailchimp/subscribe without authentication. The endpoint accepts cl...
Overview
A critical security flaw has been identified in the ElementsKit Lite plugin for WordPress. This vulnerability allows any visitor to your website, without needing a login or password, to misuse a specific function of the plugin. This function is designed to connect to Mailchimp, a popular email marketing service.
Vulnerability Explained Simply
The plugin provides a feature for website visitors to subscribe to a Mailchimp email list. To make this work, the plugin needs to communicate with Mailchimp’s systems. However, in affected versions, the “door” to this communication channel was left completely unlocked.
An attacker can send specially crafted requests directly to this open door. Because the plugin does not properly verify who is sending the request or fully check the data being sent, the attacker can force the website to forward malicious instructions to Mailchimp. Essentially, your WordPress site can be used as an unauthorized relay or “open proxy” to the Mailchimp API.
Potential Impact
The consequences of this vulnerability are severe and multifaceted:
- Unauthorized Mailchimp Access: Attackers can add, remove, or manipulate subscribers on your connected Mailchimp lists, damaging your marketing efforts and compliance.
- API Quota Exhaustion: Attackers can make a high volume of requests, quickly using up your Mailchimp API call limits, which can disrupt legitimate service and incur costs.
- Resource Abuse: The attack traffic can consume significant server resources (CPU, memory) on your WordPress hosting, potentially slowing down or crashing your site.
- Further Exploitation: This open proxy could be used as a stepping stone for more complex attacks against your Mailchimp account or to hide the attacker’s true origin.
Remediation and Mitigation
Immediate action is required to secure affected websites.
- Update Immediately: The primary fix is to update the ElementsKit Lite plugin to version 3.7.9 or later. This update properly locks the vulnerable “door” by requiring authentication.
- Verify Update: In your WordPress admin dashboard, navigate to Plugins > Installed Plugins, find “ElementsKit Lite”, and confirm its version is 3.7.9 or higher.
- Temporary Mitigation (If Update is Delayed): If you cannot update immediately, you can disable the ElementsKit Lite plugin as a temporary measure. Be aware this may affect site functionality.
- Review Mailchimp Account: Log into your linked Mailchimp account and review your audience lists for any suspicious subscriber activity. Also, check your API usage logs for unexpected spikes.
All users of the ElementsKit Lite plugin should prioritize applying this update to prevent potential exploitation.
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Related Advisories
The Pix for WooCommerce plugin for WordPress is vulnerable to arbitrary file uploads due to missing capability check and missing file type validation in the 'lkn_pix_for_woocommerce_c6_save_settings' ...
The Database for Contact Form 7, WPforms, Elementor forms plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.4.7 via deserialization of untrusted input ...
The Listee theme for WordPress is vulnerable to privilege escalation in all versions up to, and including, 1.1.6. This is due to a broken validation check in the bundled listee-core plugin's user regi...
The Clasifico Listing plugin for WordPress is vulnerable to privilege escalation in versions up to, and including, 2.0. This is due to the plugin allowing users who are registering new accounts to set...
Other WordPress Vulnerabilities
The Pix for WooCommerce plugin for WordPress is vulnerable to arbitrary file uploads due to missing capability check and missing file type validation in the 'lkn_pix_for_woocommerce_c6_save_settings' ...
The Database for Contact Form 7, WPforms, Elementor forms plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.4.7 via deserialization of untrusted input ...
The Tutor LMS – eLearning and online course solution plugin for WordPress is vulnerable to SQL Injection via the 'coupon_code' parameter in all versions up to, and including, 3.9.6 due to insufficient...
The WP Mail Logging plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.15.0 via deserialization of untrusted input from the email log message field. Thi...