CVE-2025-66146

MEDIUM5.4/ 10.0
Share:
Published: December 31, 2025 at 08:15 PM
Modified: January 20, 2026 at 03:19 PM
Source: audit@patchstack.com

Vulnerability Description

Missing Authorization vulnerability in merkulove Logger for Elementor allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Logger for Elementor: from n/a through 1.0.9.

CVSS Metrics

Base Score
5.4
Severity
MEDIUM
Vector String
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L

Weaknesses (CWE)

Source: audit@patchstack.com

AI Security Analysis

01 // Technical Summary

Merkulove Logger for Elementor versions up to 1.0.9 are vulnerable to a missing authorization flaw, allowing attackers to bypass access controls. This vulnerability enables unauthorized access to sensitive logging data, potentially leading to information disclosure and further compromise of the affected website or system.

02 // Vulnerability Mechanism

Step 1: Reconnaissance: The attacker identifies the presence of the Merkulove Logger for Elementor plugin on the target website, likely through version detection or by examining the website's source code.

Step 2: Authentication (if required): The attacker may need to obtain valid credentials for the website, potentially through social engineering, credential stuffing, or other means, depending on the website's configuration.

Step 3: Exploitation: The attacker crafts a malicious request to a vulnerable endpoint within the plugin, bypassing the missing authorization check. This request could involve reading, writing, or deleting log entries.

Step 4: Data Exfiltration/Manipulation: The attacker uses the access to the logs to gather sensitive information (e.g., user credentials, system information) or to manipulate the logs to cover their tracks or inject malicious code.

Step 5: Post-Exploitation: The attacker leverages the compromised access to further compromise the system, potentially escalating privileges, installing malware, or gaining control of the server.

03 // Deep Technical Analysis

The root cause lies in the absence of proper authorization checks within the Merkulove Logger for Elementor plugin. Specifically, the plugin fails to verify the user's role or permissions before allowing access to its logging functionality. This allows any authenticated user, or potentially even unauthenticated users if the plugin's endpoints are exposed, to access, modify, or delete log entries. The flaw likely stems from a missing is_user_logged_in() or similar check before executing sensitive operations related to log management. The lack of proper input validation could also lead to other vulnerabilities, such as SQL injection or cross-site scripting (XSS), if the log data is not sanitized.

CVE-2025-66146 - MEDIUM Severity (5.4) | Free CVE Database | 4nuxd