Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-28038: Missing Authorization in Brainstorm_Force Ultimate Addons for WPBakery Page Builder

0
Unknown
VulnerabilityCVE-2026-28038cvecve-2026-28038
Published: Thu Mar 05 2026 (03/05/2026, 05:54:14 UTC)
Source: CVE Database V5
Vendor/Project: Brainstorm_Force
Product: Ultimate Addons for WPBakery Page Builder

Description

Missing Authorization vulnerability in Brainstorm_Force Ultimate Addons for WPBakery Page Builder ultimate_vc_addons allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Ultimate Addons for WPBakery Page Builder: from n/a through <= 3.21.1.

AI-Powered Analysis

AILast updated: 03/05/2026, 07:20:05 UTC

Technical Analysis

CVE-2026-28038 identifies a missing authorization vulnerability in the Ultimate Addons for WPBakery Page Builder plugin by Brainstorm_Force, affecting all versions up to 3.21.1. The vulnerability arises from improperly configured access control security levels within the plugin's code, specifically in the ultimate_vc_addons component. This misconfiguration allows unauthorized users to bypass intended permission checks, potentially enabling them to execute privileged actions or access restricted data on WordPress sites using this plugin. The vulnerability is classified as an access control flaw, which is critical in web applications as it directly impacts the enforcement of user privileges. Although no public exploits have been reported, the widespread use of WPBakery Page Builder and its addons makes this a significant risk. The lack of a CVSS score indicates that the vulnerability is newly published and not yet fully assessed, but the nature of missing authorization typically implies a high severity due to the potential for privilege escalation or data exposure. The vulnerability affects a broad range of versions, indicating that many sites remain vulnerable until updated. The issue was reserved and published in early 2026, with no patches or mitigations officially released at the time of this report, increasing the urgency for organizations to monitor and apply updates once available.

Potential Impact

The missing authorization vulnerability can have severe consequences for organizations running WordPress sites with the Ultimate Addons for WPBakery Page Builder plugin. Exploitation could allow attackers to perform unauthorized actions such as modifying site content, injecting malicious code, accessing sensitive user data, or altering site configurations. This compromises the confidentiality, integrity, and availability of the affected websites. For e-commerce platforms or sites handling personal information, this could lead to data breaches, financial loss, reputational damage, and regulatory penalties. The ease of exploitation depends on the specific access control bypass vectors but generally does not require advanced skills, increasing the risk of widespread attacks. Since the plugin is popular globally, a large number of sites remain exposed, potentially serving as entry points for broader network compromises or supply chain attacks. The absence of known exploits currently provides a window for mitigation, but the risk of future exploitation remains high. Organizations could face operational disruptions and loss of customer trust if the vulnerability is exploited.

Mitigation Recommendations

Organizations should immediately audit their WordPress installations to identify the use of Ultimate Addons for WPBakery Page Builder, particularly versions up to 3.21.1. Until an official patch is released, administrators should restrict access to WordPress admin areas and plugin management interfaces using network-level controls such as IP whitelisting or VPN access. Implementing strict role-based access controls within WordPress can limit the impact of unauthorized access. Monitoring logs for unusual activity related to plugin endpoints or privilege escalations is critical. Consider disabling or removing the vulnerable plugin if it is not essential to site functionality. Stay informed through vendor advisories and security bulletins for patch releases and apply updates promptly. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious requests targeting the plugin’s endpoints. Regular backups and incident response plans should be in place to recover quickly if exploitation occurs. Additionally, security teams should conduct penetration testing focused on access control mechanisms to identify similar vulnerabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2026-02-25T12:13:25.489Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69a9205dd1a09e29cbe69b9d

Added to database: 3/5/2026, 6:19:09 AM

Last enriched: 3/5/2026, 7:20:05 AM

Last updated: 3/5/2026, 2:58:02 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses