CVE-2022-3830: CWE-79 Cross-Site Scripting (XSS) in Unknown WP Page Builder
The WP Page Builder WordPress plugin through 1.2.8 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
AI Analysis
Technical Summary
CVE-2022-3830 is a stored Cross-Site Scripting (XSS) vulnerability identified in the WP Page Builder WordPress plugin, affecting versions up to 1.2.8. The vulnerability arises because the plugin fails to properly sanitize and escape certain settings before rendering them in the web interface. This flaw allows users with high privileges, such as administrators, to inject malicious scripts that are stored persistently and executed in the context of other users who view the affected pages. Notably, this vulnerability can be exploited even when the WordPress 'unfiltered_html' capability is disabled, such as in multisite environments, which typically restricts the ability to post unfiltered HTML. The CVSS 3.1 base score is 4.8 (medium severity), with an attack vector of network (remote), low attack complexity, requiring high privileges, and user interaction. The scope is changed, indicating that the vulnerability affects components beyond the initially vulnerable component. The impact primarily affects confidentiality and integrity, with no direct impact on availability. There are no known public exploits in the wild, and no official patches have been linked yet. The vulnerability is classified under CWE-79, which covers improper neutralization of input during web page generation, leading to XSS attacks. Stored XSS in administrative plugins is particularly dangerous because it can lead to session hijacking, privilege escalation, or persistent malware injection within the WordPress admin interface, potentially compromising the entire site and its users.
Potential Impact
For European organizations using WordPress sites with the WP Page Builder plugin, this vulnerability poses a moderate risk. Since exploitation requires high privileges, the immediate threat is limited to insiders or attackers who have already compromised an admin account. However, successful exploitation can lead to further compromise of the website, including theft of sensitive data, defacement, or distribution of malware to site visitors. This can damage organizational reputation, lead to regulatory non-compliance (e.g., GDPR breaches if personal data is exposed), and cause operational disruptions. Multisite WordPress installations, common in larger organizations and agencies, are particularly at risk due to the bypass of unfiltered_html restrictions. Attackers could leverage this vulnerability to escalate their foothold within the network or pivot to other internal systems. Given the widespread use of WordPress in Europe for both public sector and private enterprises, the impact could be significant if not mitigated promptly.
Mitigation Recommendations
1. Immediate mitigation involves restricting administrative access to trusted personnel only and enforcing strong authentication mechanisms such as multi-factor authentication (MFA) to reduce the risk of credential compromise. 2. Monitor and audit admin user activities and plugin settings for suspicious changes or injected scripts. 3. Disable or remove the WP Page Builder plugin if it is not essential or replace it with a more secure alternative. 4. Apply strict Content Security Policy (CSP) headers to limit the execution of unauthorized scripts on the website. 5. Implement web application firewalls (WAFs) with rules tailored to detect and block XSS payloads targeting WordPress admin interfaces. 6. Regularly update WordPress core and plugins, and closely monitor vendor announcements for patches addressing this vulnerability. 7. For multisite environments, review and tighten capability assignments and consider additional input validation layers at the application or server level. 8. Conduct security awareness training for administrators to recognize and avoid risky behaviors that could lead to privilege escalation or injection of malicious content.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Belgium, Sweden, Austria
CVE-2022-3830: CWE-79 Cross-Site Scripting (XSS) in Unknown WP Page Builder
Description
The WP Page Builder WordPress plugin through 1.2.8 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
AI-Powered Analysis
Technical Analysis
CVE-2022-3830 is a stored Cross-Site Scripting (XSS) vulnerability identified in the WP Page Builder WordPress plugin, affecting versions up to 1.2.8. The vulnerability arises because the plugin fails to properly sanitize and escape certain settings before rendering them in the web interface. This flaw allows users with high privileges, such as administrators, to inject malicious scripts that are stored persistently and executed in the context of other users who view the affected pages. Notably, this vulnerability can be exploited even when the WordPress 'unfiltered_html' capability is disabled, such as in multisite environments, which typically restricts the ability to post unfiltered HTML. The CVSS 3.1 base score is 4.8 (medium severity), with an attack vector of network (remote), low attack complexity, requiring high privileges, and user interaction. The scope is changed, indicating that the vulnerability affects components beyond the initially vulnerable component. The impact primarily affects confidentiality and integrity, with no direct impact on availability. There are no known public exploits in the wild, and no official patches have been linked yet. The vulnerability is classified under CWE-79, which covers improper neutralization of input during web page generation, leading to XSS attacks. Stored XSS in administrative plugins is particularly dangerous because it can lead to session hijacking, privilege escalation, or persistent malware injection within the WordPress admin interface, potentially compromising the entire site and its users.
Potential Impact
For European organizations using WordPress sites with the WP Page Builder plugin, this vulnerability poses a moderate risk. Since exploitation requires high privileges, the immediate threat is limited to insiders or attackers who have already compromised an admin account. However, successful exploitation can lead to further compromise of the website, including theft of sensitive data, defacement, or distribution of malware to site visitors. This can damage organizational reputation, lead to regulatory non-compliance (e.g., GDPR breaches if personal data is exposed), and cause operational disruptions. Multisite WordPress installations, common in larger organizations and agencies, are particularly at risk due to the bypass of unfiltered_html restrictions. Attackers could leverage this vulnerability to escalate their foothold within the network or pivot to other internal systems. Given the widespread use of WordPress in Europe for both public sector and private enterprises, the impact could be significant if not mitigated promptly.
Mitigation Recommendations
1. Immediate mitigation involves restricting administrative access to trusted personnel only and enforcing strong authentication mechanisms such as multi-factor authentication (MFA) to reduce the risk of credential compromise. 2. Monitor and audit admin user activities and plugin settings for suspicious changes or injected scripts. 3. Disable or remove the WP Page Builder plugin if it is not essential or replace it with a more secure alternative. 4. Apply strict Content Security Policy (CSP) headers to limit the execution of unauthorized scripts on the website. 5. Implement web application firewalls (WAFs) with rules tailored to detect and block XSS payloads targeting WordPress admin interfaces. 6. Regularly update WordPress core and plugins, and closely monitor vendor announcements for patches addressing this vulnerability. 7. For multisite environments, review and tighten capability assignments and consider additional input validation layers at the application or server level. 8. Conduct security awareness training for administrators to recognize and avoid risky behaviors that could lead to privilege escalation or injection of malicious content.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- WPScan
- Date Reserved
- 2022-11-02T09:42:40.880Z
- Cisa Enriched
- true
Threat ID: 682d9840c4522896dcbf150f
Added to database: 5/21/2025, 9:09:20 AM
Last enriched: 6/24/2025, 3:11:15 AM
Last updated: 8/4/2025, 12:59:45 PM
Views: 13
Related Threats
CVE-2025-9050: SQL Injection in projectworlds Travel Management System
MediumCVE-2025-9047: SQL Injection in projectworlds Visitor Management System
MediumCVE-2025-9046: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9028: SQL Injection in code-projects Online Medicine Guide
MediumCVE-2025-26709: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in ZTE F50
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.