CVE-2023-5087: CWE-79 Cross-Site Scripting (XSS) in Unknown Page Builder: Pagelayer
The Page Builder: Pagelayer WordPress plugin before 1.7.8 doesn't prevent attackers with author privileges and higher from inserting malicious JavaScript inside a post's header or footer code.
AI Analysis
Technical Summary
CVE-2023-5087 is a medium-severity vulnerability classified as CWE-79 (Cross-Site Scripting, XSS) affecting the WordPress plugin "Page Builder: Pagelayer" in versions prior to 1.7.8, specifically noted in version 1.3.2. The vulnerability arises because the plugin does not properly sanitize or restrict the insertion of JavaScript code within a post's header or footer sections by users with author-level privileges or higher. This means that any authenticated user with at least author rights can embed malicious JavaScript payloads that will execute in the context of users viewing the affected pages. The vulnerability requires user interaction (visiting the compromised page) and privileges at the author level or above, which is a moderate barrier to exploitation but still significant given that many WordPress sites grant author privileges to trusted contributors or editors. The vulnerability impacts confidentiality and integrity by allowing script injection that could lead to session hijacking, privilege escalation, or defacement, but does not directly affect availability. The scope is limited to WordPress sites using the vulnerable plugin versions, which are publicly available and popular for page building. No known exploits are currently reported in the wild, and no official patches or updates are linked yet, though the fixed version is 1.7.8 or later. The vulnerability is network exploitable (remote) but requires authentication and user interaction, with a CVSS v3.1 score of 5.4 (medium).
Potential Impact
For European organizations using WordPress sites with the Page Builder: Pagelayer plugin, this vulnerability poses a risk of targeted attacks where malicious insiders or compromised author accounts could inject harmful scripts. This can lead to theft of user credentials, session tokens, or the injection of further malware, potentially compromising sensitive customer or internal data. Organizations in sectors such as e-commerce, media, education, and government that rely on WordPress for public-facing websites could see reputational damage and loss of user trust if exploited. The vulnerability could also facilitate lateral movement within an organization's web infrastructure if attackers escalate privileges or pivot from compromised user sessions. While the direct impact on availability is low, the integrity and confidentiality risks could be significant, especially if combined with social engineering or phishing campaigns. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers often weaponize such vulnerabilities once publicly disclosed.
Mitigation Recommendations
1. Immediately upgrade the Page Builder: Pagelayer plugin to version 1.7.8 or later where the vulnerability is fixed. 2. Restrict author-level privileges strictly to trusted users and review user roles to minimize the number of users who can add or edit post headers and footers. 3. Implement Content Security Policy (CSP) headers to limit the execution of unauthorized scripts on WordPress sites. 4. Regularly audit posts and pages for unauthorized or suspicious JavaScript code, especially in header and footer sections. 5. Employ Web Application Firewalls (WAFs) with rules to detect and block XSS payloads targeting WordPress plugins. 6. Monitor user activity logs for unusual behavior from author or higher-privilege accounts. 7. Educate content authors and editors about the risks of inserting untrusted code and enforce strict content review processes. 8. Consider disabling the ability to add custom scripts in headers/footers if not essential for site functionality.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2023-5087: CWE-79 Cross-Site Scripting (XSS) in Unknown Page Builder: Pagelayer
Description
The Page Builder: Pagelayer WordPress plugin before 1.7.8 doesn't prevent attackers with author privileges and higher from inserting malicious JavaScript inside a post's header or footer code.
AI-Powered Analysis
Technical Analysis
CVE-2023-5087 is a medium-severity vulnerability classified as CWE-79 (Cross-Site Scripting, XSS) affecting the WordPress plugin "Page Builder: Pagelayer" in versions prior to 1.7.8, specifically noted in version 1.3.2. The vulnerability arises because the plugin does not properly sanitize or restrict the insertion of JavaScript code within a post's header or footer sections by users with author-level privileges or higher. This means that any authenticated user with at least author rights can embed malicious JavaScript payloads that will execute in the context of users viewing the affected pages. The vulnerability requires user interaction (visiting the compromised page) and privileges at the author level or above, which is a moderate barrier to exploitation but still significant given that many WordPress sites grant author privileges to trusted contributors or editors. The vulnerability impacts confidentiality and integrity by allowing script injection that could lead to session hijacking, privilege escalation, or defacement, but does not directly affect availability. The scope is limited to WordPress sites using the vulnerable plugin versions, which are publicly available and popular for page building. No known exploits are currently reported in the wild, and no official patches or updates are linked yet, though the fixed version is 1.7.8 or later. The vulnerability is network exploitable (remote) but requires authentication and user interaction, with a CVSS v3.1 score of 5.4 (medium).
Potential Impact
For European organizations using WordPress sites with the Page Builder: Pagelayer plugin, this vulnerability poses a risk of targeted attacks where malicious insiders or compromised author accounts could inject harmful scripts. This can lead to theft of user credentials, session tokens, or the injection of further malware, potentially compromising sensitive customer or internal data. Organizations in sectors such as e-commerce, media, education, and government that rely on WordPress for public-facing websites could see reputational damage and loss of user trust if exploited. The vulnerability could also facilitate lateral movement within an organization's web infrastructure if attackers escalate privileges or pivot from compromised user sessions. While the direct impact on availability is low, the integrity and confidentiality risks could be significant, especially if combined with social engineering or phishing campaigns. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers often weaponize such vulnerabilities once publicly disclosed.
Mitigation Recommendations
1. Immediately upgrade the Page Builder: Pagelayer plugin to version 1.7.8 or later where the vulnerability is fixed. 2. Restrict author-level privileges strictly to trusted users and review user roles to minimize the number of users who can add or edit post headers and footers. 3. Implement Content Security Policy (CSP) headers to limit the execution of unauthorized scripts on WordPress sites. 4. Regularly audit posts and pages for unauthorized or suspicious JavaScript code, especially in header and footer sections. 5. Employ Web Application Firewalls (WAFs) with rules to detect and block XSS payloads targeting WordPress plugins. 6. Monitor user activity logs for unusual behavior from author or higher-privilege accounts. 7. Educate content authors and editors about the risks of inserting untrusted code and enforce strict content review processes. 8. Consider disabling the ability to add custom scripts in headers/footers if not essential for site functionality.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- WPScan
- Date Reserved
- 2023-09-20T14:21:15.301Z
- Cisa Enriched
- true
Threat ID: 682d9847c4522896dcbf53cc
Added to database: 5/21/2025, 9:09:27 AM
Last enriched: 6/22/2025, 9:22:13 AM
Last updated: 7/25/2025, 11:31:09 AM
Views: 12
Related Threats
CVE-2025-8842: Use After Free in NASM Netwide Assember
MediumCVE-2025-8841: Unrestricted Upload in zlt2000 microservices-platform
MediumCVE-2025-8840: Improper Authorization in jshERP
MediumCVE-2025-8853: CWE-290 Authentication Bypass by Spoofing in 2100 Technology Official Document Management System
CriticalCVE-2025-8838: Improper Authentication in WinterChenS my-site
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.