CVE-2026-1004

Source
https://cve.org/CVERecord?id=CVE-2026-1004
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-1004.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-1004
Published
2026-01-16T09:16:21.407Z
Modified
2026-03-15T22:51:52.376722Z
Severity
  • 5.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N CVSS Calculator
Summary
[none]
Details

The Essential Addons for Elementor plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to and including 6.5.5 via the 'eaelproductquickview_popup' function. This makes it possible for unauthenticated attackers to retrieve WooCommerce product information for products with draft, pending, or private status, which should normally be restricted.

References

Affected packages

Git / github.com/wpdevelopers/essential-addons-for-elementor-lite

Affected ranges

Type
GIT
Repo
https://github.com/wpdevelopers/essential-addons-for-elementor-lite
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

2.*
2.10.1
2.2.0
2.7.8
2.8.6
2.9.0
2.9.2
2.9.4
2.9.6
2.9.8
4.*
4.3.1-beta
4.9.4
v4.*
v4.3.0
v4.9.1
v4.9.2
v4.9.3
v4.9.5
v4.9.6
v4.9.7
v5.*
v5.0.0
v5.0.1
v5.0.10
v5.0.11
v5.0.12
v5.0.13
v5.0.2
v5.0.3
v5.0.4
v5.0.5
v5.0.6
v5.0.7
v5.0.8
v5.0.9
v5.1.0
v5.1.1
v5.1.2
v5.1.3
v5.1.4
v5.1.5
v5.1.6
v5.1.7
v5.1.8
v5.1.9
v5.2.0
v5.2.1
v5.2.2
v5.2.3
v5.2.4
v5.3.0
v5.3.1
v5.3.2
v5.7.2
v5.7.3
v5.7.4
v5.8.0
v5.8.1
v5.8.10
v5.8.11
v5.8.12
v5.8.13
v5.8.14
v5.8.15
v5.8.16
v5.8.17
v5.8.18
v5.8.2
v5.8.3
v5.8.4
v5.8.5
v5.8.6
v5.8.7
v5.8.8
v5.8.9
v5.9.0
v5.9.1
v5.9.10
v5.9.11
v5.9.12
v5.9.13
v5.9.14
v5.9.15
v5.9.16
v5.9.17
v5.9.18
v5.9.19
v5.9.2
v5.9.20
v5.9.21
v5.9.22
v5.9.23
v5.9.24
v5.9.25
v5.9.26
v5.9.27
v5.9.3
v5.9.4
v5.9.5
v5.9.6
v5.9.7
v5.9.8
v5.9.9
v6.*
v6.0.0
v6.0.1
v6.0.10
v6.0.11
v6.0.12
v6.0.13
v6.0.14
v6.0.15
v6.0.2
v6.0.3
v6.0.4
v6.0.5
v6.0.6
v6.0.7
v6.0.8
v6.0.9
v6.1.0
v6.1.1
v6.1.10
v6.1.11
v6.1.12
v6.1.13
v6.1.14
v6.1.15
v6.1.16
v6.1.17
v6.1.18
v6.1.19
v6.1.2
v6.1.20
v6.1.3
v6.1.4
v6.1.5
v6.1.6
v6.1.7
v6.1.8
v6.1.9
v6.2.0
v6.2.1
v6.2.2
v6.2.3
v6.2.4
v6.3.0
v6.3.1
v6.3.2
v6.3.3
v6.4.0
v6.5.0
v6.5.1
v6.5.2
v6.5.3
v6.5.4
v6.5.5

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-1004.json"