CVE-2024-13430: CWE-284 Improper Access Control in softaculous Page Builder: Pagelayer – Drag and Drop website builder
CVE-2024-13430 is a medium severity vulnerability in the WordPress plugin Page Builder: Pagelayer – Drag and Drop website builder, affecting all versions up to 1. 9. 8. It allows authenticated users with Contributor-level access or higher to exploit improper access control in the 'pagelayer_builder_posts_shortcode' function. This flaw enables unauthorized reading of private post data that should be restricted. The vulnerability does not require user interaction and can be exploited remotely over the network. Although it does not impact integrity or availability, the confidentiality breach could expose sensitive content. No known public exploits exist yet, and no official patches have been released. Organizations using this plugin should restrict Contributor access and monitor for suspicious activity until a fix is available. The vulnerability primarily affects WordPress sites using this plugin, which are widespread globally but especially prevalent in countries with large WordPress user bases.
AI Analysis
Technical Summary
CVE-2024-13430 is an information exposure vulnerability classified under CWE-284 (Improper Access Control) found in the WordPress plugin Page Builder: Pagelayer – Drag and Drop website builder, versions up to and including 1.9.8. The vulnerability arises from insufficient access restrictions in the 'pagelayer_builder_posts_shortcode' function, which is responsible for handling shortcode requests that include posts. Authenticated users with Contributor-level permissions or higher can exploit this flaw to retrieve data from private posts that should normally be inaccessible to them. This occurs because the plugin fails to properly verify whether the requesting user has the necessary rights to view the content of these private posts before including them in shortcode output. The vulnerability is remotely exploitable over the network without requiring user interaction, but it does require authentication with at least Contributor privileges. The impact is limited to confidentiality, as attackers can read private post content but cannot modify or delete data, nor disrupt service availability. The CVSS v3.1 base score is 4.3, indicating a medium severity level. No public exploits or patches have been reported as of the publication date. This vulnerability affects all installations of the plugin up to version 1.9.8, which is widely used in WordPress environments for drag-and-drop website building. The flaw highlights the importance of strict access control enforcement in plugins that handle content rendering and shortcode processing.
Potential Impact
The primary impact of CVE-2024-13430 is unauthorized disclosure of private post content within WordPress sites using the vulnerable Page Builder: Pagelayer plugin. This can lead to leakage of sensitive or confidential information, potentially exposing business secrets, personal data, or unpublished content. Organizations relying on this plugin may face reputational damage, loss of user trust, or compliance issues if private data is exposed. Since exploitation requires Contributor-level access, the threat is more significant in environments where such roles are granted to multiple users or where accounts may be compromised. The vulnerability does not allow data modification or service disruption, limiting its impact to confidentiality breaches. However, in sectors like media, legal, healthcare, or finance where private content confidentiality is critical, this exposure could have serious consequences. The lack of a patch and known exploits means the risk is currently theoretical but could increase if attackers develop exploits. The widespread use of WordPress globally means many organizations could be affected, especially those that use this plugin for content management and website building.
Mitigation Recommendations
Until an official patch is released, organizations should implement the following specific mitigations: 1) Restrict Contributor and higher-level user roles to trusted personnel only, minimizing the number of users who can exploit this vulnerability. 2) Review and audit user permissions regularly to ensure no unnecessary elevated privileges are granted. 3) Disable or uninstall the Page Builder: Pagelayer plugin if it is not essential, or replace it with alternative page builder plugins that do not have this vulnerability. 4) Monitor web server and WordPress logs for unusual shortcode requests or access patterns that could indicate exploitation attempts. 5) Employ web application firewalls (WAF) with custom rules to detect and block suspicious shortcode parameter usage targeting the vulnerable function. 6) Educate site administrators and users about the risk and encourage prompt reporting of suspicious activity. 7) Stay updated with vendor announcements and apply patches immediately once available. 8) Consider implementing additional access control mechanisms at the WordPress or server level to restrict access to private content beyond plugin controls.
Affected Countries
United States, India, Brazil, Germany, United Kingdom, Canada, Australia, France, Japan, Netherlands, Italy, Spain
CVE-2024-13430: CWE-284 Improper Access Control in softaculous Page Builder: Pagelayer – Drag and Drop website builder
Description
CVE-2024-13430 is a medium severity vulnerability in the WordPress plugin Page Builder: Pagelayer – Drag and Drop website builder, affecting all versions up to 1. 9. 8. It allows authenticated users with Contributor-level access or higher to exploit improper access control in the 'pagelayer_builder_posts_shortcode' function. This flaw enables unauthorized reading of private post data that should be restricted. The vulnerability does not require user interaction and can be exploited remotely over the network. Although it does not impact integrity or availability, the confidentiality breach could expose sensitive content. No known public exploits exist yet, and no official patches have been released. Organizations using this plugin should restrict Contributor access and monitor for suspicious activity until a fix is available. The vulnerability primarily affects WordPress sites using this plugin, which are widespread globally but especially prevalent in countries with large WordPress user bases.
AI-Powered Analysis
Technical Analysis
CVE-2024-13430 is an information exposure vulnerability classified under CWE-284 (Improper Access Control) found in the WordPress plugin Page Builder: Pagelayer – Drag and Drop website builder, versions up to and including 1.9.8. The vulnerability arises from insufficient access restrictions in the 'pagelayer_builder_posts_shortcode' function, which is responsible for handling shortcode requests that include posts. Authenticated users with Contributor-level permissions or higher can exploit this flaw to retrieve data from private posts that should normally be inaccessible to them. This occurs because the plugin fails to properly verify whether the requesting user has the necessary rights to view the content of these private posts before including them in shortcode output. The vulnerability is remotely exploitable over the network without requiring user interaction, but it does require authentication with at least Contributor privileges. The impact is limited to confidentiality, as attackers can read private post content but cannot modify or delete data, nor disrupt service availability. The CVSS v3.1 base score is 4.3, indicating a medium severity level. No public exploits or patches have been reported as of the publication date. This vulnerability affects all installations of the plugin up to version 1.9.8, which is widely used in WordPress environments for drag-and-drop website building. The flaw highlights the importance of strict access control enforcement in plugins that handle content rendering and shortcode processing.
Potential Impact
The primary impact of CVE-2024-13430 is unauthorized disclosure of private post content within WordPress sites using the vulnerable Page Builder: Pagelayer plugin. This can lead to leakage of sensitive or confidential information, potentially exposing business secrets, personal data, or unpublished content. Organizations relying on this plugin may face reputational damage, loss of user trust, or compliance issues if private data is exposed. Since exploitation requires Contributor-level access, the threat is more significant in environments where such roles are granted to multiple users or where accounts may be compromised. The vulnerability does not allow data modification or service disruption, limiting its impact to confidentiality breaches. However, in sectors like media, legal, healthcare, or finance where private content confidentiality is critical, this exposure could have serious consequences. The lack of a patch and known exploits means the risk is currently theoretical but could increase if attackers develop exploits. The widespread use of WordPress globally means many organizations could be affected, especially those that use this plugin for content management and website building.
Mitigation Recommendations
Until an official patch is released, organizations should implement the following specific mitigations: 1) Restrict Contributor and higher-level user roles to trusted personnel only, minimizing the number of users who can exploit this vulnerability. 2) Review and audit user permissions regularly to ensure no unnecessary elevated privileges are granted. 3) Disable or uninstall the Page Builder: Pagelayer plugin if it is not essential, or replace it with alternative page builder plugins that do not have this vulnerability. 4) Monitor web server and WordPress logs for unusual shortcode requests or access patterns that could indicate exploitation attempts. 5) Employ web application firewalls (WAF) with custom rules to detect and block suspicious shortcode parameter usage targeting the vulnerable function. 6) Educate site administrators and users about the risk and encourage prompt reporting of suspicious activity. 7) Stay updated with vendor announcements and apply patches immediately once available. 8) Consider implementing additional access control mechanisms at the WordPress or server level to restrict access to private content beyond plugin controls.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-01-15T19:43:28.411Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6e56b7ef31ef0b59e80c
Added to database: 2/25/2026, 9:49:10 PM
Last enriched: 2/26/2026, 1:13:52 AM
Last updated: 2/26/2026, 11:14:35 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-64999: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Checkmk GmbH Checkmk
HighCVE-2026-28138: Deserialization of Untrusted Data in Stylemix uListing
HighCVE-2026-28136: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in VeronaLabs WP SMS
HighCVE-2026-28132: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in villatheme WooCommerce Photo Reviews
HighCVE-2026-28131: Insertion of Sensitive Information Into Sent Data in WPVibes Elementor Addon Elements
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.