If you are using the WordPress Builder Shortcode Extras Plugin, you need to take immediate action! A new security vulnerability has been discovered in version 1.0.0 and below, exposing websites to potential attacks. This issue, classified as Broken Access Control, allows unauthorized users to access restricted areas, potentially compromising website data.

With no official fix available, WordPress site owners must take precautionary steps to secure their websites. In this blog, we will explore the details of this vulnerability, assess its impact, and provide actionable solutions to protect your site.
What is the WordPress Builder Shortcode Extras Plugin?
The Builder Shortcode Extras Plugin is a widely used WordPress plugin designed to extend the capabilities of page builders by adding extra shortcodes. Many website owners rely on it to enhance their site’s functionality without coding. However, vulnerabilities in such plugins can pose a serious threat to site security.
Why This Vulnerability Matters
Security researchers have found that all versions up to 1.0.0 of this plugin suffer from a Broken Access Control flaw. This vulnerability allows attackers to bypass security restrictions and gain unauthorized access to sensitive website areas, leading to:

- Unauthorized content modifications
- Potential data leaks
- Unauthorized admin access
- Increased risk of website takeovers
Since no official fix has been released, website owners must explore alternative security measures to mitigate risks.
Vulnerability Details
- Plugin Name: Builder Shortcode Extras
- Vulnerable Versions: <= 1.0.0
- Vulnerability Type: Broken Access Control
- Impact Level: Medium
- Official Fix: None
- Patch Priority: Low
- vPatch Required? No
- Fixed Version Available? No
What is Broken Access Control?
Broken access control occurs when a website fails to enforce proper security measures, allowing unauthorized users to access or modify restricted data. In this case, the plugin does not properly validate user permissions, leading to a potential security breach.
How to Protect Your Website
Since there is no official fix, WordPress site owners should take the following steps to secure their websites:
1. Disable or Remove the Plugin
The best immediate solution is to disable or uninstall the plugin until an official security patch is released.
2. Use a Web Application Firewall (WAF)
A WAF can help block unauthorized access and prevent exploitation of vulnerabilities. Consider using a trusted WAF solution such as:

- Cloudflare WAF (Cloudflare Security)
- Sucuri Firewall (Sucuri)
- Wordfence Security (Wordfence)
3. Monitor User Permissions and Access Logs
Regularly check your user roles and access logs in WordPress to ensure that no unauthorized changes have been made.
4. Apply Custom Fixes (Advanced Users)
If you have development knowledge, you can implement custom access control rules via your functions.php file or a custom security plugin to restrict unauthorized access.
5. Stay Updated on Security Advisories
Follow security platforms like:
- WordPress Plugin Vulnerability Database (WPScan)
- National Vulnerability Database (NVD) (NVD)
- Exploit Database (Exploit-DB)
Conclusion
The WordPress Builder Shortcode Extras Plugin (<= 1.0.0) is vulnerable to Broken Access Control, potentially exposing websites to unauthorized access. Since there is no official fix available, users must take precautionary steps such as removing the plugin, using a WAF, and monitoring site activity.
Stay Secure – Take Action Now!
Until an official patch is released, securing your website is crucial. If you’re unsure how to proceed, consider consulting a WordPress security expert or using alternative, regularly updated plugins.
For more security updates, subscribe to our newsletter and stay ahead of potential threats!
Thank you for visiting! Check out our blog homepage to explore more insightful articles.