# ๐Ÿ›ก๏ธ Anant Addons for Elementor <= 1.1.5 - CSRF to Arbitrary Plugin Installation ## ๐Ÿงจ CVE-2025-32641 **Cross-Site Request Forgery (CSRF)** vulnerability in **anantaddons**' Anant Addons for Elementor This issue affects versions: **from unknown through 1.1.5** - **Base Score**: 9.6 (CRITICAL) - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H` --- ## ๐Ÿ” Description This vulnerability allows **unauthenticated attackers** to perform **arbitrary plugin installation** on behalf of a logged-in administrator without their knowledge. By crafting a malicious page or form, the attacker can silently force the admin to install and activate any plugin from the WordPress repository. --- ## ๐Ÿ’ฅ Impact - โœ… Arbitrary plugin installation - โœ… Plugin activation - โŒ No nonce or CSRF protection - โœ… Exploitable via a simple HTML page - โš ๏ธ Requires admin to be logged in and open the malicious page --- ## ๐Ÿงช HTML Proof of Concept ```html Anant Addons for Elementor <= 1.1.5 CSRF Exploit

Anant Addons for Elementor <= 1.1.5
CSRF to Arbitrary Plugin Installation Vulnerability

# By: Nxploited | Khaled Alenazi

# Type: CSRF (No Nonce Validation)

# Impact: Unauthenticated attacker can force admin to install and activate arbitrary WordPress plugins

๐ŸŽฏ Click the button below to trigger plugin installation (admin session must be active):

``` > ๐ŸŽฏ When a logged-in administrator clicks this form (or it auto-submits in a malicious page), the plugin will be silently installed and activated. --- ## โš ๏ธ Disclaimer This repository and content are for **educational and security research purposes only**. The author is **not responsible** for any misuse or damage caused by improper use of this information. Always perform testing on systems **you own or have explicit permission to test**. --- *by: Nxploited | Khaled ALenazi*