The Plus Addons for Elementor – Addons for Elementor, Page Template…

The Plus Addons for Elementor – Addons for Elementor, Page Template…

by | Feb 18, 2026 | Plugins

Attack Vectors

Medium severity (CVSS 4.3) vulnerability CVE-2026-2386 affects the WordPress plugin The Plus Addons for Elementor – Addons for Elementor, Page Templates, Widgets, Mega Menu, WooCommerce (slug: the-plus-addons-for-elementor-page-builder) in versions up to and including 6.4.7.

The attack requires an attacker to be logged in with at least Author-level access (or higher). It can be executed remotely over the network and does not require a victim to click anything. In practical business terms, this is most relevant for organizations with multiple users (marketing teams, agencies, contractors, or partners) who have content-creation privileges in the WordPress admin.

By abusing an AJAX action used to create content, an authenticated user may be able to create arbitrary draft posts for certain restricted post types by supplying a user-controlled post_type value.

Security Weakness

The issue is an incorrect authorization control in the plugin’s AJAX handler (tpae_create_page()). According to the published advisory, the handler checks only whether the user can edit posts, but it accepts a user-controlled post_type value and passes it into WordPress’s content-creation workflow without performing additional checks for post-type-specific permissions.

In other words, a user who is allowed to create or edit standard posts may be able to create draft content in areas that should be more tightly controlled, depending on how your site uses custom post types and role permissions.

Remediation: Update The Plus Addons for Elementor to version 6.4.8 or a newer patched release. Reference: Wordfence vulnerability record.

Technical or Business Impacts

While this vulnerability is rated Medium and does not indicate direct data theft or site downtime in the advisory, it can still create meaningful business risk—especially for brands with strict governance around what content exists in the CMS.

Operational and governance impacts: Unauthorized draft creation can increase editorial noise, complicate approval workflows, and undermine role-based controls that compliance teams rely on. For marketing leaders, this can translate into delayed campaigns, confusion over “source of truth” content, and additional administrative overhead.

Brand and compliance impacts: Draft content can still be discovered internally, surfaced in previews, or mistakenly published during routine content operations. For regulated organizations, unexpected content artifacts in the CMS can raise audit and record-management concerns—even if the content was never intended for publication.

Risk context: The attack requires an authenticated user (Author+), so the most common real-world triggers include credential compromise, over-permissioned accounts, shared logins, or third-party contributors with broader access than necessary.

Similar Attacks

Authorization gaps and privilege boundary issues in web applications and platforms are a common root cause of real-world incidents. Examples include:

MOVEit Transfer exploitation (CISA Alert, 2023) — widely exploited to access and manipulate sensitive environments, demonstrating how access control weaknesses can quickly become enterprise-impacting.

Microsoft Exchange Server vulnerabilities (CISA Alert, 2021) — illustrates how flaws that enable unauthorized actions can create major business disruption and incident response costs.

Equifax settlement announcement (FTC, 2019) — a high-profile example of how security failures can lead to regulatory, legal, and reputational fallout.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers