Description
Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in RadiusTheme ShopBuilder – Elementor WooCommerce Builder Addons shopbuilder allows Retrieve Embedded Sensitive Data.This issue affects ShopBuilder – Elementor WooCommerce Builder Addons: from n/a through <= 3.2.4.
Published: 2026-03-13
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Sensitive Data Exposure
Action: Apply Patch
AI Analysis

Impact

The RadiusTheme ShopBuilder – Elementor WooCommerce Builder Addons plugin (versions <= 3.2.4) contains a flaw that enables retrieval of embedded sensitive system information, allowing attackers to expose confidential data within a WordPress site. Key detail from vendor description: the plugin can expose sensitive system information to an unauthorized control sphere, categorized as CWE-497. This vulnerability compromises confidentiality by exposing embedded sensitive data to anyone who can trigger the flaw.

Affected Systems

Affected systems are WordPress installations that include the RadiusTheme ShopBuilder – Elementor WooCommerce Builder Addons plugin from its initial release through version 3.2.4, as specified by vendor documentation. Any site using these versions is susceptible to the data exposure if the plugin is active. Key detail from vendor documentation: all releases from n/a through <= 3.2.4 are affected.

Risk and Exploitability

The severity rating per CVSS is 5.3, indicating moderate difficulty in exploitation, while the EPSS score is less than 1%, suggesting a low likelihood of real-world exploitation. Key detail from scoring data: the vulnerability is not listed in the CISA KEV catalog. The description does not explicitly state an authentication requirement, so based on the description it is inferred that an attacker could potentially exploit the flaw via publicly accessible plugin endpoints or through administrative access to the WordPress backend, exposing confidential information.

Generated by OpenCVE AI on March 17, 2026 at 17:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Verify the current ShopBuilder plugin version.
  • Upgrade the RadiusTheme ShopBuilder – Elementor WooCommerce Builder Addons to a version newer than 3.2.4 if available.
  • If no update is available, consider disabling or removing the plugin until a patch is released.
  • Restrict access to the WordPress admin area to trusted users as an additional precaution.
  • Monitor the vendor's official channels for patch releases or temporary fixes.

Generated by OpenCVE AI on March 17, 2026 at 17:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 17 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 16 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Radiustheme
Radiustheme shopbuilder – Elementor Woocommerce Builder Addons
Wordpress
Wordpress wordpress
Vendors & Products Radiustheme
Radiustheme shopbuilder – Elementor Woocommerce Builder Addons
Wordpress
Wordpress wordpress

Fri, 13 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
Description Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in RadiusTheme ShopBuilder – Elementor WooCommerce Builder Addons shopbuilder allows Retrieve Embedded Sensitive Data.This issue affects ShopBuilder – Elementor WooCommerce Builder Addons: from n/a through <= 3.2.4.
Title WordPress ShopBuilder – Elementor WooCommerce Builder Addons plugin <= 3.2.4 - Sensitive Data Exposure vulnerability
Weaknesses CWE-497
References

Subscriptions

Radiustheme Shopbuilder – Elementor Woocommerce Builder Addons
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-01T14:16:02.107Z

Reserved: 2026-03-12T11:10:59.411Z

Link: CVE-2026-32372

cve-icon Vulnrichment

Updated: 2026-03-17T13:36:23.385Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-13T19:54:51.673

Modified: 2026-03-17T14:16:15.957

Link: CVE-2026-32372

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-23T12:05:14Z

Weaknesses