Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-13430: CWE-284 Improper Access Control in softaculous Page Builder: Pagelayer – Drag and Drop website builder

0
Medium
VulnerabilityCVE-2024-13430cvecve-2024-13430cwe-284
Published: Wed Mar 12 2025 (03/12/2025, 08:21:37 UTC)
Source: CVE Database V5
Vendor/Project: softaculous
Product: Page Builder: Pagelayer – Drag and Drop website builder

Description

CVE-2024-13430 is a medium severity vulnerability in the WordPress plugin Page Builder: Pagelayer – Drag and Drop website builder, affecting all versions up to 1. 9. 8. It allows authenticated users with Contributor-level access or higher to exploit improper access control in the 'pagelayer_builder_posts_shortcode' function. This flaw enables unauthorized reading of private post data that should be restricted. The vulnerability does not require user interaction and can be exploited remotely over the network. Although it does not impact integrity or availability, the confidentiality breach could expose sensitive content. No known public exploits exist yet, and no official patches have been released. Organizations using this plugin should restrict Contributor access and monitor for suspicious activity until a fix is available. The vulnerability primarily affects WordPress sites using this plugin, which are widespread globally but especially prevalent in countries with large WordPress user bases.

AI-Powered Analysis

AILast updated: 02/26/2026, 01:13:52 UTC

Technical Analysis

CVE-2024-13430 is an information exposure vulnerability classified under CWE-284 (Improper Access Control) found in the WordPress plugin Page Builder: Pagelayer – Drag and Drop website builder, versions up to and including 1.9.8. The vulnerability arises from insufficient access restrictions in the 'pagelayer_builder_posts_shortcode' function, which is responsible for handling shortcode requests that include posts. Authenticated users with Contributor-level permissions or higher can exploit this flaw to retrieve data from private posts that should normally be inaccessible to them. This occurs because the plugin fails to properly verify whether the requesting user has the necessary rights to view the content of these private posts before including them in shortcode output. The vulnerability is remotely exploitable over the network without requiring user interaction, but it does require authentication with at least Contributor privileges. The impact is limited to confidentiality, as attackers can read private post content but cannot modify or delete data, nor disrupt service availability. The CVSS v3.1 base score is 4.3, indicating a medium severity level. No public exploits or patches have been reported as of the publication date. This vulnerability affects all installations of the plugin up to version 1.9.8, which is widely used in WordPress environments for drag-and-drop website building. The flaw highlights the importance of strict access control enforcement in plugins that handle content rendering and shortcode processing.

Potential Impact

The primary impact of CVE-2024-13430 is unauthorized disclosure of private post content within WordPress sites using the vulnerable Page Builder: Pagelayer plugin. This can lead to leakage of sensitive or confidential information, potentially exposing business secrets, personal data, or unpublished content. Organizations relying on this plugin may face reputational damage, loss of user trust, or compliance issues if private data is exposed. Since exploitation requires Contributor-level access, the threat is more significant in environments where such roles are granted to multiple users or where accounts may be compromised. The vulnerability does not allow data modification or service disruption, limiting its impact to confidentiality breaches. However, in sectors like media, legal, healthcare, or finance where private content confidentiality is critical, this exposure could have serious consequences. The lack of a patch and known exploits means the risk is currently theoretical but could increase if attackers develop exploits. The widespread use of WordPress globally means many organizations could be affected, especially those that use this plugin for content management and website building.

Mitigation Recommendations

Until an official patch is released, organizations should implement the following specific mitigations: 1) Restrict Contributor and higher-level user roles to trusted personnel only, minimizing the number of users who can exploit this vulnerability. 2) Review and audit user permissions regularly to ensure no unnecessary elevated privileges are granted. 3) Disable or uninstall the Page Builder: Pagelayer plugin if it is not essential, or replace it with alternative page builder plugins that do not have this vulnerability. 4) Monitor web server and WordPress logs for unusual shortcode requests or access patterns that could indicate exploitation attempts. 5) Employ web application firewalls (WAF) with custom rules to detect and block suspicious shortcode parameter usage targeting the vulnerable function. 6) Educate site administrators and users about the risk and encourage prompt reporting of suspicious activity. 7) Stay updated with vendor announcements and apply patches immediately once available. 8) Consider implementing additional access control mechanisms at the WordPress or server level to restrict access to private content beyond plugin controls.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-01-15T19:43:28.411Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e56b7ef31ef0b59e80c

Added to database: 2/25/2026, 9:49:10 PM

Last enriched: 2/26/2026, 1:13:52 AM

Last updated: 2/26/2026, 11:14:35 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats