Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

royal-elementor-addons

About This Vendor

royal-elementor-addons is a technology vendor producing software and infrastructure products. As a software provider, royal-elementor-addons's broad product portfolio across multiple domains—including operating systems, cloud infrastructure, enterprise applications, databases, networking, and security tools—creates a large attack surface. Additionally, long support cycles, widespread deployment, and continuous feature development contribute to the accumulation of discovered vulnerabilities over time. Major vendors typically report higher CVE counts not necessarily due to inferior security, but because of greater exposure to security research, responsible disclosure practices, and the sheer complexity of maintaining multiple product lines and legacy systems. Regular security assessments and patching of royal-elementor-addons's products are critical for organizations running their software in production environments.

Vulnerability Trends for This Vendor

SecUtils has indexed 59 known vulnerabilities from royal-elementor-addons. This includes 1 critical-severity issue and 3 high-severity issues that represent significant risk. These vulnerabilities affect 2 distinct products across royal-elementor-addons's portfolio, demonstrating the breadth of the vendor's product ecosystem and the importance of comprehensive patch management strategies. Disclosure dates span from 2023 through 2025, with recent active disclosure activity. Organizations deploying royal-elementor-addons products should maintain active vulnerability monitoring, prioritize critical patches, and implement compensating controls where patches cannot be applied immediately.

ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2022-4102 2023-01-09 2025-04-09 3.1 - -
CVE-2022-4103 2023-01-09 2025-04-09 4.3 - -
CVE-2022-4700 2023-01-10 2024-11-21 5.4 - -
CVE-2022-4701 2023-01-10 2024-11-21 4.3 - -
CVE-2022-4702 2023-01-10 2024-11-21 5.4 - -
CVE-2022-4703 2023-01-10 2024-11-21 4.3 - -
CVE-2022-4704 2023-01-10 2024-11-21 5.4 - -
CVE-2022-4705 2023-01-10 2024-11-21 4.3 - -
CVE-2022-4707 2023-01-10 2024-11-21 4.3 - -
CVE-2022-4708 2023-01-10 2024-11-21 4.3 - -
CVE-2022-4709 2023-01-10 2024-11-21 4.3 - -
CVE-2022-4710 2023-01-10 2024-11-21 6.1 - -
CVE-2022-4711 2023-01-10 2024-11-21 4.3 - -
CVE-2023-3709 2023-07-18 2024-11-21 5.3 - -
CVE-2022-47175 2023-10-06 2024-11-21 4.3 - -
CVE-2023-5360 2023-10-31 2024-11-21 9.8 - -
CVE-2023-5922 2024-01-16 2025-06-02 7.5 - -
CVE-2024-0835 2024-02-05 2024-11-21 4.3 - -
CVE-2024-0511 2024-02-08 2024-11-21 4.3 - -
CVE-2024-0442 2024-02-29 2025-01-08 6.4 - -
CVE-2024-0512 2024-02-29 2025-01-08 4.3 - -
CVE-2024-0513 2024-02-29 2025-01-08 4.3 - -
CVE-2024-0514 2024-02-29 2025-01-08 4.3 - -
CVE-2024-0515 2024-02-29 2025-01-08 4.3 - -
CVE-2024-0516 2024-02-29 2025-01-08 5.3 - -
CVE-2024-1500 2024-03-07 2025-01-08 5.4 - -
CVE-2024-31236 2024-04-07 2025-01-08 6.5 - -
CVE-2024-2798 2024-04-23 2025-01-10 6.5 - -
CVE-2024-2799 2024-04-23 2025-01-10 6.4 - -
CVE-2024-3889 2024-04-23 2025-01-10 6.4 - -
CVE-2024-1567 2024-05-02 2025-01-08 8.2 - -
CVE-2024-3675 2024-05-02 2025-01-08 6.4 - -
CVE-2024-3887 2024-05-16 2025-01-15 5.4 - -
CVE-2024-32786 2024-05-17 2025-03-10 5.3 - -
CVE-2024-4087 2024-06-01 2025-01-08 6.4 - -
CVE-2024-4342 2024-06-01 2025-01-08 6.4 - -
CVE-2024-4488 2024-06-07 2024-11-21 6.4 - -
CVE-2024-4489 2024-06-07 2024-11-21 6.4 - -
CVE-2024-5818 2024-07-24 2024-11-21 6.4 - -
CVE-2024-44001 2024-09-18 2024-09-25 6.5 - -
CVE-2024-8482 2024-10-08 2025-01-15 6.4 - -
CVE-2024-7417 2024-10-17 2025-01-10 4.3 - -
CVE-2024-50442 2024-10-28 2024-10-29 6.5 - -
CVE-2024-9059 2024-11-13 2024-11-19 6.4 - -
CVE-2024-9668 2024-11-13 2024-11-19 6.4 - -
CVE-2024-9682 2024-11-13 2024-11-19 6.4 - -
CVE-2024-10798 2024-11-28 2025-03-04 4.3 - -
CVE-2024-56226 2024-12-31 2025-03-21 7.1 - -
CVE-2024-56227 2024-12-31 2025-03-21 4.3 - -
CVE-2024-56062 2024-12-31 2025-03-21 6.5 - -
CVE-2025-0393 2025-01-14 2025-03-03 6.1 - -
CVE-2025-1441 2025-02-19 2025-02-28 6.1 - -
CVE-2025-1455 2025-04-12 2025-07-08 6.4 - -
CVE-2025-1456 2025-04-12 2025-07-08 6.4 - -
CVE-2025-26990 2025-04-15 2025-07-08 4.4 - -
CVE-2024-12120 2025-05-07 2025-07-11 5.4 - -
CVE-2025-39361 2025-05-07 2025-07-11 6.5 - -
CVE-2025-3813 2025-05-31 2025-07-11 6.4 - -
CVE-2025-5338 2025-06-26 2025-07-08 6.4 - -

How SecUtils Normalizes Vendor Data

SecUtils aggregates National Vulnerability Database (NVD) and MITRE records for royal-elementor-addons by normalizing vendor identifiers across diverse data sources, mapping vendor names to their associated product lines, and collecting all known vulnerabilities under a unified vendor context. For every CVE associated with royal-elementor-addons's products, we extract and structure Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) categories, CVSS severity metrics, and reference links to enable rapid vulnerability identification and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and vendor vulnerability tracking.