In this long read post, we discuss a critical vulnerability (CVE-2023-3709) that affects the popular Royal Elementor Addons plugin for WordPress. Unauthenticated attackers can exploit this vulnerability to obtain a site's MailChimp API key, posing a significant security risk. We'll cover key details including the affected plugin versions and an overview of the exploit, as well as provide information on patching the vulnerability and mitigating potential threats.

Vulnerable Versions

The Royal Elementor Addons plugin for WordPress has a high-severity vulnerability affecting versions up to, and including, 1.3.70. This vulnerability exists due to the plugin adding the API key to the source code of any page running the MailChimp block.

Exploit Details

An attacker can exploit this vulnerability by simply viewing the source code of any page that utilizes the problematic MailChimp block. The API key will be visible, allowing the attacker to obtain a site's MailChimp API key without any authentication needed. This API key can then be used in various malicious ways, including accessing a site's subscriber data and potentially sending out spam or phishing emails.

Here is a sample code snippet that demonstrates how the vulnerable MailChimp block includes the API key in the source code:

< script>
  document.addEventListener("DOMContentLoaded", function() {
    var apiKey = "123456789abcdef123456789abcdef-us1";
    var mailchimpInstance = new MailChimp(apiKey);
< /script>

In this example, the API key "123456789abcdef123456789abcdef-us1" is clearly visible and makes the site vulnerable to unauthenticated attackers.

Original References

The CVE-2023-3709 vulnerability was originally reported on [1. the plugin's support forums], and [2. a security researcher's blog post]. Additionally, check [3. the official CVE database] for more information on this vulnerability.

Mitigation Steps

If you are running a vulnerable version of the Royal Elementor Addons plugin with the MailChimp block enabled, we recommend the following steps:

Update the plugin to the latest version (if available) to fix the vulnerability.

2. Reset your MailChimp API key as it may have been compromised. You can do this by logging into your MailChimp account, navigating to the "Account" page, and selecting "Extras" > "API Keys." Here, you can generate a new API key and delete the old one.
3. Consider implementing additional security measures, such as using a secure plugin to manage and protect your API keys.


CVE-2023-3709 is a severe security vulnerability in the Royal Elementor Addons plugin, allowing unauthenticated attackers to obtain a site's MailChimp API key. Understanding the vulnerability and implementing the necessary steps to mitigate potential threats are essential for maintaining the security of your WordPress website. Keep your plugins updated and follow best practices for API key management to protect your site from malicious actors.



Published on: 07/18/2023 03:15:00 UTC
Last modified on: 07/27/2023 15:04:00 UTC