Page Builder by SiteOrigin Vulnerability (High) – CVE-2026-2448

Page Builder by SiteOrigin Vulnerability (High) – CVE-2026-2448

by | Mar 2, 2026 | Plugins

Attack Vectors

Page Builder by SiteOrigin (slug: siteorigin-panels) is affected by a High-severity vulnerability (CVSS 8.8, CVE-2026-2448) impacting versions up to and including 2.33.5. The issue is an Authenticated (Contributor+) Local File Inclusion (LFI), meaning the attacker must have a valid login with at least Contributor-level permissions.

From a business perspective, the most realistic entry points are compromised or misused accounts: a phished Contributor credential, a shared password, a former contractor account that was never removed, or any situation where lower-privilege access exists but is not tightly controlled. Because the attack does not require a victim to click anything, it can be carried out quickly once an attacker has access.

In environments where multiple teams publish content (marketing, agencies, regional teams), the pool of Contributor accounts can be large. That increases the chance that one account is exposed and gives an attacker the foothold needed to leverage this vulnerability.

Security Weakness

This vulnerability is rooted in how the plugin handles template location and inclusion through the locate_template() function. In affected versions, an authenticated attacker can abuse this behavior to include files from the server that were not intended to be loaded in that context.

In practical terms, Local File Inclusion can enable an attacker to reach sensitive server-side data or, in certain circumstances, trigger execution of PHP code contained in files on the server. The risk becomes more severe when an attacker can get a file onto the server that can be “included” (for example, if so-called safe uploads can be leveraged in a way that leads to executable code being included).

Because the attacker only needs Contributor-level access (not full admin), this is an example of a weakness that can turn “limited” access into a much larger security event. The security concern is not only what one user can do inside WordPress, but how that access can be escalated into broader control.

Technical or Business Impacts

High severity (CVSS 8.8) is appropriate here because the potential outcomes include exposure of sensitive data, bypassing access controls, and possible code execution. For executives and marketing leaders, the most important consideration is that a compromised Contributor account could become a gateway to a full site compromise.

Business impacts can include brand and revenue damage from website defacement, malicious redirects, or unauthorized content changes that undermine customer trust and campaign performance. If attackers gain deeper access, they may be able to quietly modify landing pages, forms, or calls-to-action to siphon leads or inject fraud.

Compliance and legal exposure is also a concern. If sensitive information is accessed (for example, configuration details, logs, or other data stored on the server), the incident could trigger breach response obligations, customer notifications, and increased scrutiny from auditors or regulators depending on your industry.

Remediation: Update Page Builder by SiteOrigin to 2.34.0 or a newer patched version as recommended by the source advisory. In parallel, review and reduce unnecessary Contributor accounts, enforce strong authentication, and verify that past contributors/agencies no longer retain access.

Similar Attacks

Local File Inclusion and related file-inclusion patterns have been repeatedly used to escalate from a single foothold to broader compromise. Notable examples include:

Drupal “Drupalgeddon 2” (CVE-2018-7600) — a widely exploited flaw that demonstrated how quickly content-management vulnerabilities can lead to major, business-impacting compromises.

Apache HTTP Server Path Traversal (CVE-2021-41773) — an example of how traversal/file access issues can expose sensitive files and, in certain configurations, enable code execution.

PHP-FPM / NGINX configuration issue (CVE-2019-11043) — another real-world case where server-side weaknesses were leveraged for significant compromise and downstream business damage.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers