CVE-2026-23693
Wpmet · ElementsKit Lite WordPress Plugin
The ElementsKit Lite plugin for WordPress exposes a REST endpoint without authentication, allowing unauthenticated attackers to use the site as an open proxy for Mailchimp API requests.
Executive summary
A critical unauthenticated REST API vulnerability in the ElementsKit Lite WordPress plugin allows attackers to hijack Mailchimp API credentials and perform unauthorized actions.
Vulnerability
The /wp-json/elementskit/v1/widget/mailchimp/subscribe endpoint is exposed without any authentication requirement. An unauthenticated attacker can supply their own Mailchimp API credentials and use the server as an open proxy to manipulate subscription data or exhaust API quotas.
Business impact
This vulnerability can lead to the exhaustion of Mailchimp API limits, manipulation of marketing databases, and significant resource consumption on the host WordPress site. With a CVSS score of 10.0, this is a maximum-severity flaw that could also lead to reputational damage if the site is used for spam.
Remediation
Immediate Action: Update the ElementsKit Lite plugin to version 3.7.9 or later immediately to restrict access to the vulnerable REST endpoint.
Proactive Monitoring: Review WordPress access logs for high volumes of requests to the /wp-json/elementskit/v1/widget/mailchimp/subscribe endpoint.
Compensating Controls: Use a Web Application Firewall (WAF) to block unauthenticated requests to the specific REST API endpoint until the plugin can be updated.
Exploitation status
Public Exploit Available: false
Analyst recommendation
With a CVSS score of 10.0, this is an urgent security matter. Administrators should prioritize updating this plugin across all managed WordPress sites to prevent unauthorized use of their infrastructure as an attack proxy.