Skip to main content

CVE-2022-3830: CWE-79 Cross-Site Scripting (XSS) in Unknown WP Page Builder

Medium
Published: Mon Dec 05 2022 (12/05/2022, 16:50:33 UTC)
Source: CVE
Vendor/Project: Unknown
Product: WP Page Builder

Description

The WP Page Builder WordPress plugin through 1.2.8 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).

AI-Powered Analysis

AILast updated: 06/24/2025, 03:11:15 UTC

Technical Analysis

CVE-2022-3830 is a stored Cross-Site Scripting (XSS) vulnerability identified in the WP Page Builder WordPress plugin, affecting versions up to 1.2.8. The vulnerability arises because the plugin fails to properly sanitize and escape certain settings before rendering them in the web interface. This flaw allows users with high privileges, such as administrators, to inject malicious scripts that are stored persistently and executed in the context of other users who view the affected pages. Notably, this vulnerability can be exploited even when the WordPress 'unfiltered_html' capability is disabled, such as in multisite environments, which typically restricts the ability to post unfiltered HTML. The CVSS 3.1 base score is 4.8 (medium severity), with an attack vector of network (remote), low attack complexity, requiring high privileges, and user interaction. The scope is changed, indicating that the vulnerability affects components beyond the initially vulnerable component. The impact primarily affects confidentiality and integrity, with no direct impact on availability. There are no known public exploits in the wild, and no official patches have been linked yet. The vulnerability is classified under CWE-79, which covers improper neutralization of input during web page generation, leading to XSS attacks. Stored XSS in administrative plugins is particularly dangerous because it can lead to session hijacking, privilege escalation, or persistent malware injection within the WordPress admin interface, potentially compromising the entire site and its users.

Potential Impact

For European organizations using WordPress sites with the WP Page Builder plugin, this vulnerability poses a moderate risk. Since exploitation requires high privileges, the immediate threat is limited to insiders or attackers who have already compromised an admin account. However, successful exploitation can lead to further compromise of the website, including theft of sensitive data, defacement, or distribution of malware to site visitors. This can damage organizational reputation, lead to regulatory non-compliance (e.g., GDPR breaches if personal data is exposed), and cause operational disruptions. Multisite WordPress installations, common in larger organizations and agencies, are particularly at risk due to the bypass of unfiltered_html restrictions. Attackers could leverage this vulnerability to escalate their foothold within the network or pivot to other internal systems. Given the widespread use of WordPress in Europe for both public sector and private enterprises, the impact could be significant if not mitigated promptly.

Mitigation Recommendations

1. Immediate mitigation involves restricting administrative access to trusted personnel only and enforcing strong authentication mechanisms such as multi-factor authentication (MFA) to reduce the risk of credential compromise. 2. Monitor and audit admin user activities and plugin settings for suspicious changes or injected scripts. 3. Disable or remove the WP Page Builder plugin if it is not essential or replace it with a more secure alternative. 4. Apply strict Content Security Policy (CSP) headers to limit the execution of unauthorized scripts on the website. 5. Implement web application firewalls (WAFs) with rules tailored to detect and block XSS payloads targeting WordPress admin interfaces. 6. Regularly update WordPress core and plugins, and closely monitor vendor announcements for patches addressing this vulnerability. 7. For multisite environments, review and tighten capability assignments and consider additional input validation layers at the application or server level. 8. Conduct security awareness training for administrators to recognize and avoid risky behaviors that could lead to privilege escalation or injection of malicious content.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
WPScan
Date Reserved
2022-11-02T09:42:40.880Z
Cisa Enriched
true

Threat ID: 682d9840c4522896dcbf150f

Added to database: 5/21/2025, 9:09:20 AM

Last enriched: 6/24/2025, 3:11:15 AM

Last updated: 8/4/2025, 12:59:45 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats