SKT Page Builder Vulnerability (Medium) – CVE-2025-54005

SKT Page Builder Vulnerability (Medium) – CVE-2025-54005

by | Feb 25, 2026 | Plugins

Medium-severity vulnerability CVE-2025-54005 affects the SKT Page Builder WordPress plugin (slug: skt-builder) in versions 4.9 and below. With a CVSS score of 4.3 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N), it can allow an authenticated user (subscriber level or higher) to perform an unauthorized action due to missing authorization checks.

Attack Vectors

The primary attack vector is a logged-in WordPress account with subscriber-level permissions or above. In many organizations, subscriber accounts exist due to newsletter sign-ups, customer portals, partner access, or “register to download” marketing forms—making this a realistic risk for public-facing sites.

Because the issue is reachable over the network and does not require user interaction (per the CVSS vector), an attacker who obtains or registers a low-privileged account may be able to trigger the vulnerable function directly and attempt the unauthorized action.

Security Weakness

SKT Page Builder <= 4.9 is vulnerable due to a missing capability check (also commonly described as missing authorization) on a plugin function. In practical terms, this means the plugin may not consistently verify whether the logged-in user should be allowed to perform the action before executing it.

This is a governance and controls issue as much as a technical one: WordPress roles are intended to limit what different classes of users can do. When a plugin bypasses those checks, it undermines least-privilege access and can create unexpected administrative exposure.

Reference: Wordfence vulnerability advisory.

Technical or Business Impacts

While this CVE is rated Medium, it can still create meaningful business risk because it enables unauthorized actions by low-privileged accounts. Even limited unauthorized changes can affect brand trust, campaign performance, and site reliability.

Typical outcomes of authorization gaps in site-building plugins can include: unexpected changes to site content or layout, workflow disruption for marketing teams, reduced confidence in campaign landing pages, and increased operational overhead for incident response and verification of what changed and when.

Remediation: Update SKT Page Builder to version 5.0 or a newer patched version. After patching, review user accounts and roles (especially subscribers), and audit recent site changes for anything unexpected during the exposure window.

Similar Attacks

Authorization and capability-check issues are a common theme in WordPress security incidents because they allow low-privileged users to do more than intended. Examples of real, documented issues include:

CVE-2018-19207 (WP GDPR Compliance) – a privilege/authorization-related issue that demonstrated how role validation gaps can lead to unauthorized changes.
CVE-2019-8942 (WordPress core) – an authenticated issue that underscored how even “logged-in user” weaknesses can still carry significant operational risk.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers