Vulnerability Monitor

The vendors, products, and vulnerabilities you care about
essential_addons_for_elementor Vendor: wpdeveloper

About This Product

essential_addons_for_elementor is a software product offered by wpdeveloper. This product is widely deployed in production environments, making vulnerability monitoring essential for organizations relying on it. Security vulnerabilities in products of this category can affect system availability, data confidentiality, and integrity across entire networks. The significant number of reported vulnerabilities indicates this product has received substantial security scrutiny and community focus over time. Regular assessment of known vulnerabilities and timely patching are fundamental components of responsible system administration for any deployment of this software.

Vulnerability Landscape Summary

SecUtils has identified 55 known vulnerabilities affecting wpdeveloper essential_addons_for_elementor. This includes 2 critical-severity issues and 7 high-severity issues that warrant immediate attention. Vulnerabilities in this product have been disclosed spanning from 2021 to 2025, indicating a recent active security attention. 45 medium-severity issues and 1 low-severity issue complete the vulnerability landscape. Organizations should prioritize patching based on deployment context, asset criticality, and exploitation likelihood rather than severity alone.

Known Vulnerabilities
ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2021-24255 2021-05-05 2024-11-21 5.4 3.5 Unknown
CVE-2022-0320 2022-02-01 2024-11-21 9.8 7.5 Likely
CVE-2022-0683 2022-02-24 2024-11-21 6.1 4.3 Likely
CVE-2023-32243 2023-05-12 2024-11-21 9.8 - -
CVE-2023-3779 2023-07-20 2024-11-21 5.3 - -
CVE-2023-32241 2023-08-29 2024-11-21 7.1 - -
CVE-2023-32245 2023-11-18 2024-11-21 5.4 - -
CVE-2023-7044 2024-01-04 2024-11-21 6.4 - -
CVE-2024-0585 2024-02-05 2024-11-21 5.4 - -
CVE-2024-0586 2024-02-05 2024-11-21 6.5 - -
CVE-2024-0954 2024-02-05 2024-11-21 6.4 - -
CVE-2024-1171 2024-02-29 2025-01-08 5.4 - -
CVE-2024-1172 2024-02-29 2025-01-08 5.4 - -
CVE-2024-1236 2024-02-29 2025-01-08 6.4 - -
CVE-2024-1276 2024-02-29 2025-01-08 6.4 - -
CVE-2024-1536 2024-03-13 2025-01-08 7.4 - -
CVE-2024-1537 2024-03-13 2025-01-08 6.4 - -
CVE-2024-3018 2024-03-30 2025-01-08 8.8 - -
CVE-2024-2623 2024-04-09 2025-01-08 6.4 - -
CVE-2024-2650 2024-04-09 2025-01-08 6.4 - -
CVE-2024-2974 2024-04-09 2025-01-08 5.3 - -
CVE-2024-3333 2024-04-17 2025-01-08 6.4 - -
CVE-2024-3645 2024-04-22 2025-01-10 6.4 - -
CVE-2024-3733 2024-04-25 2025-01-10 5.3 - -
CVE-2024-3728 2024-05-02 2025-01-08 6.4 - -
CVE-2024-4003 2024-05-02 2025-01-15 6.4 - -
CVE-2024-4156 2024-05-02 2025-01-15 6.4 - -
CVE-2024-4275 2024-05-14 2025-01-15 6.4 - -
CVE-2024-4448 2024-05-14 2025-01-15 6.5 - -
CVE-2024-4449 2024-05-14 2025-01-15 6.4 - -
CVE-2024-4624 2024-05-14 2025-01-15 6.4 - -
CVE-2023-41955 2024-05-17 2025-03-06 8.8 - -
CVE-2024-5086 2024-05-29 2025-03-01 6.4 - -
CVE-2024-5073 2024-05-30 2025-01-15 6.4 - -
CVE-2024-5188 2024-06-06 2024-11-21 6.4 - -
CVE-2024-5612 2024-06-07 2024-11-21 6.4 - -
CVE-2024-5189 2024-06-11 2025-01-15 6.4 - -
CVE-2024-39649 2024-08-01 2025-03-01 6.5 - -
CVE-2024-7092 2024-08-13 2025-01-08 6.4 - -
CVE-2024-8440 2024-09-11 2024-09-25 6.4 - -
CVE-2024-8742 2024-09-13 2024-09-27 6.4 - -
CVE-2021-4446 2024-10-16 2025-01-10 6.3 - -
CVE-2021-4447 2024-10-16 2025-01-10 8.8 - -
CVE-2024-8961 2024-11-15 2024-11-19 6.4 - -
CVE-2024-8978 2024-11-15 2024-11-19 5.7 - -
CVE-2024-8979 2024-11-15 2024-11-19 8.0 - -
CVE-2024-56063 2024-12-31 2025-03-06 6.5 - -
CVE-2025-39589 2025-04-16 2026-01-28 4.3 - -
CVE-2025-39590 2025-04-16 2026-01-28 6.5 - -
CVE-2025-24752 2025-04-17 2026-01-26 7.1 - -
CVE-2024-9993 2025-06-07 2025-07-14 6.4 - -
CVE-2024-9994 2025-06-07 2025-07-14 6.4 - -
CVE-2025-6244 2025-07-08 2025-07-09 6.4 - -
CVE-2025-64352 2025-10-31 2026-01-29 2.7 - -
CVE-2025-69092 2025-12-30 2026-01-29 6.5 - -

How SecUtils Interprets Product Data

SecUtils normalizes and enriches National Vulnerability Database (NVD) records for wpdeveloper essential_addons_for_elementor by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and structuring the data for rapid analysis and asset correlation. For every vulnerability listed, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference information to enable organizations to prioritize patching and risk assessment efficiently. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for vulnerability management and security operations.