Post Type Builder Vulnerability (Medium) – CVE-2024-31366

Post Type Builder Vulnerability (Medium) – CVE-2024-31366

by | Feb 26, 2026 | Plugins

Attack Vectors

CVE-2024-31366 affects the WordPress plugin Post Type Builder (slug: themify-ptb) in versions earlier than 2.1.4. The issue is rated Medium severity (CVSS 4.3; CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N), meaning it is reachable over the network and does not require user interaction, but it does require an attacker to be logged in.

The primary attack vector is a compromised or malicious low-privilege account (e.g., Subscriber and above). Once authenticated, an attacker can exploit the missing authorization check to create arbitrary posts and pages, even if their role would not normally allow content creation. This can occur in environments where user registrations are enabled, where membership/customer accounts exist, or where an attacker has obtained credentials through password reuse or credential stuffing.

Security Weakness

The vulnerability stems from a missing capability (authorization) check in a plugin function. In business terms, this is an access-control failure: the system does not consistently verify that a logged-in user is allowed to perform a sensitive action.

Because this weakness exists in all versions up to (but not including) 2.1.4, organizations running older versions may unintentionally allow low-privilege users to create content that appears legitimate on the site. The vendor’s remediation is straightforward: update Post Type Builder to version 2.1.4 or newer.

Technical or Business Impacts

While this vulnerability does not indicate data theft (no confidentiality impact) or direct outage (no availability impact), it does introduce a clear integrity risk: unauthorized content creation can undermine your brand, marketing performance, and compliance posture.

Potential business impacts include:

Brand and reputation risk: Attackers can publish misleading pages (fake promotions, fraudulent support pages, or damaging messages) that look like official content, eroding customer trust.

Marketing and revenue impact: Unauthorized pages can be used to divert leads, manipulate conversion paths, or publish “spoof” landing pages that confuse prospects and reduce campaign performance.

SEO and domain trust damage: Spam or low-quality pages can lead to search engine penalties, reduced rankings, and long-term cleanup costs.

Fraud enablement: Attackers may create pages designed to collect customer information or redirect traffic to external scams, increasing legal and reputational exposure.

Compliance and governance concerns: If your organization has content approval workflows or regulated messaging requirements, unauthorized publishing can create audit findings and policy violations.

Recommended action: update Post Type Builder (themify-ptb) to 2.1.4 or a newer patched version and review whether any unexpected posts/pages were created by low-privilege accounts. For reference, see the CVE record at https://www.cve.org/CVERecord?id=CVE-2024-31366 and the source advisory at Wordfence Threat Intel.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers