57
grade D
3 days ago
mcp_so

Elementor MCP Server

A simple MCP server for Wordpress Elementor

Install from

M8ven verifies MCPs across every public registry — install directly from whichever one you prefer.

// key findings
⚠️
Known vulnerabilities in dependencies: 5 high
Affects packages this MCP installs at runtime. Upgrade or remove the affected dependency.
No credential exfiltration, no sensitive file access, no obfuscation
Static analysis found nothing flowing your secrets to unexpected places.
🔐
You'll be asked for 1 credential: WP_APP_PASSWORD
These are read from process.env at runtime. Make sure you trust where they’ll be sent.
// required environment variables
This server reads these from process.env. You'll be asked to provide them before it can run.
configTARGET_ID
configTARGET_SLUG
🔐 secretWP_APP_PASSWORD"": "Appl icat ion_ Pass word"
configWP_APP_USERThe username of the target website. Note: it's the username to log in to the target website, not the application name.
configWP_URLThe URL of the target website.
// full audit trail
The full breakdown of what we checked, the deductions that landed, the network hosts, the dependency advisories, and concrete fix guidance is available to verified publishers.
// improvement guidance — verified publishers only
We have 6 concrete improvements we can share with the publisher of this MCP. Each comes with specific guidance to raise the trust score.
// embed badge in your README
[![M8ven Score](https://m8ven.ai/badge/mcp/aguaitech-elementor-mcp-qsuxwt)](https://m8ven.ai/mcp/aguaitech-elementor-mcp-qsuxwt)
commit: d53b4079e1979ddce1c134dbc7e7ba57f2a86a4e
code hash: 8bb17aa6a3c3ea898048a378a8511ee8d640fb3ae24c26ad1ffccd694401e6cc
verified: 4/18/2026, 6:00:58 PM
view raw JSON →