CVE-2023-5124: CWE-79 Cross-Site Scripting (XSS) in Unknown Page Builder: Pagelayer
The Page Builder: Pagelayer WordPress plugin before 1.8.0 doesn't prevent attackers with administrator privileges from inserting malicious JavaScript inside a post's header or footer code, even when unfiltered_html is disallowed, such as in multi-site WordPress configurations.
AI Analysis
Technical Summary
CVE-2023-5124 is a Cross-Site Scripting (XSS) vulnerability identified in the WordPress plugin 'Page Builder: Pagelayer' versions prior to 1.8.0, specifically noted in version 1.3.2. This vulnerability arises because the plugin fails to properly sanitize or restrict the insertion of malicious JavaScript code by users with administrator privileges into the header or footer sections of posts. Notably, this issue persists even when the WordPress configuration disallows unfiltered_html capabilities, such as in multi-site environments where stricter content filtering is typically enforced. The vulnerability is classified under CWE-79, indicating improper neutralization of input during web page generation, which can lead to script injection. The CVSS v3.1 base score is 4.8 (medium severity), reflecting that exploitation requires high privileges (administrator), user interaction (such as viewing the malicious content), and results in limited confidentiality and integrity impacts without affecting availability. The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially vulnerable component, potentially impacting other users or site visitors. Although no known exploits are currently reported in the wild, the vulnerability could be leveraged by malicious administrators or attackers who have gained administrative access to inject JavaScript that executes in the browsers of site visitors or other administrators, potentially leading to session hijacking, defacement, or further privilege escalation within the WordPress site environment.
Potential Impact
For European organizations using the Page Builder: Pagelayer plugin, this vulnerability poses a risk primarily to the integrity and confidentiality of their WordPress sites. Since exploitation requires administrator privileges, the threat is significant in scenarios where administrative accounts are compromised or insider threats exist. Successful exploitation could allow attackers to execute arbitrary JavaScript in the context of the website, potentially stealing session cookies, redirecting users to malicious sites, or injecting further malicious payloads. This could lead to data breaches, reputational damage, and loss of customer trust. In multi-site WordPress configurations, common in larger organizations and hosting providers, the risk is amplified as the vulnerability bypasses unfiltered_html restrictions, potentially affecting multiple sites under a single installation. Given the widespread use of WordPress across European businesses, especially SMEs and content-heavy organizations, the vulnerability could disrupt business operations and compliance with data protection regulations such as GDPR if personal data is exposed or manipulated.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Immediately update the Page Builder: Pagelayer plugin to version 1.8.0 or later, where the vulnerability is addressed. 2) Restrict administrator privileges strictly, ensuring only trusted personnel have such access, and regularly audit admin accounts for suspicious activity. 3) Implement Web Application Firewall (WAF) rules that detect and block suspicious script injections in post headers and footers. 4) Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts on the website. 5) In multi-site environments, review and harden user role permissions and consider additional plugin-level restrictions to prevent unauthorized code insertion. 6) Monitor website content and logs for unusual script insertions or modifications. 7) Educate administrators about the risks of inserting untrusted code and enforce secure coding and content management practices. These steps go beyond generic patching by emphasizing privilege management, detection, and defense-in-depth strategies.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2023-5124: CWE-79 Cross-Site Scripting (XSS) in Unknown Page Builder: Pagelayer
Description
The Page Builder: Pagelayer WordPress plugin before 1.8.0 doesn't prevent attackers with administrator privileges from inserting malicious JavaScript inside a post's header or footer code, even when unfiltered_html is disallowed, such as in multi-site WordPress configurations.
AI-Powered Analysis
Technical Analysis
CVE-2023-5124 is a Cross-Site Scripting (XSS) vulnerability identified in the WordPress plugin 'Page Builder: Pagelayer' versions prior to 1.8.0, specifically noted in version 1.3.2. This vulnerability arises because the plugin fails to properly sanitize or restrict the insertion of malicious JavaScript code by users with administrator privileges into the header or footer sections of posts. Notably, this issue persists even when the WordPress configuration disallows unfiltered_html capabilities, such as in multi-site environments where stricter content filtering is typically enforced. The vulnerability is classified under CWE-79, indicating improper neutralization of input during web page generation, which can lead to script injection. The CVSS v3.1 base score is 4.8 (medium severity), reflecting that exploitation requires high privileges (administrator), user interaction (such as viewing the malicious content), and results in limited confidentiality and integrity impacts without affecting availability. The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially vulnerable component, potentially impacting other users or site visitors. Although no known exploits are currently reported in the wild, the vulnerability could be leveraged by malicious administrators or attackers who have gained administrative access to inject JavaScript that executes in the browsers of site visitors or other administrators, potentially leading to session hijacking, defacement, or further privilege escalation within the WordPress site environment.
Potential Impact
For European organizations using the Page Builder: Pagelayer plugin, this vulnerability poses a risk primarily to the integrity and confidentiality of their WordPress sites. Since exploitation requires administrator privileges, the threat is significant in scenarios where administrative accounts are compromised or insider threats exist. Successful exploitation could allow attackers to execute arbitrary JavaScript in the context of the website, potentially stealing session cookies, redirecting users to malicious sites, or injecting further malicious payloads. This could lead to data breaches, reputational damage, and loss of customer trust. In multi-site WordPress configurations, common in larger organizations and hosting providers, the risk is amplified as the vulnerability bypasses unfiltered_html restrictions, potentially affecting multiple sites under a single installation. Given the widespread use of WordPress across European businesses, especially SMEs and content-heavy organizations, the vulnerability could disrupt business operations and compliance with data protection regulations such as GDPR if personal data is exposed or manipulated.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Immediately update the Page Builder: Pagelayer plugin to version 1.8.0 or later, where the vulnerability is addressed. 2) Restrict administrator privileges strictly, ensuring only trusted personnel have such access, and regularly audit admin accounts for suspicious activity. 3) Implement Web Application Firewall (WAF) rules that detect and block suspicious script injections in post headers and footers. 4) Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts on the website. 5) In multi-site environments, review and harden user role permissions and consider additional plugin-level restrictions to prevent unauthorized code insertion. 6) Monitor website content and logs for unusual script insertions or modifications. 7) Educate administrators about the risks of inserting untrusted code and enforce secure coding and content management practices. These steps go beyond generic patching by emphasizing privilege management, detection, and defense-in-depth strategies.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- WPScan
- Date Reserved
- 2023-09-22T15:11:21.835Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682f60d40acd01a24926443e
Added to database: 5/22/2025, 5:37:24 PM
Last enriched: 7/8/2025, 9:14:16 AM
Last updated: 8/18/2025, 6:54:34 AM
Views: 15
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.