Skip to main content

CVE-2023-5124: CWE-79 Cross-Site Scripting (XSS) in Unknown Page Builder: Pagelayer

Medium
VulnerabilityCVE-2023-5124cvecve-2023-5124cwe-79
Published: Mon Jan 29 2024 (01/29/2024, 14:44:23 UTC)
Source: CVE
Vendor/Project: Unknown
Product: Page Builder: Pagelayer

Description

The Page Builder: Pagelayer WordPress plugin before 1.8.0 doesn't prevent attackers with administrator privileges from inserting malicious JavaScript inside a post's header or footer code, even when unfiltered_html is disallowed, such as in multi-site WordPress configurations.

AI-Powered Analysis

AILast updated: 07/08/2025, 09:14:16 UTC

Technical Analysis

CVE-2023-5124 is a Cross-Site Scripting (XSS) vulnerability identified in the WordPress plugin 'Page Builder: Pagelayer' versions prior to 1.8.0, specifically noted in version 1.3.2. This vulnerability arises because the plugin fails to properly sanitize or restrict the insertion of malicious JavaScript code by users with administrator privileges into the header or footer sections of posts. Notably, this issue persists even when the WordPress configuration disallows unfiltered_html capabilities, such as in multi-site environments where stricter content filtering is typically enforced. The vulnerability is classified under CWE-79, indicating improper neutralization of input during web page generation, which can lead to script injection. The CVSS v3.1 base score is 4.8 (medium severity), reflecting that exploitation requires high privileges (administrator), user interaction (such as viewing the malicious content), and results in limited confidentiality and integrity impacts without affecting availability. The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially vulnerable component, potentially impacting other users or site visitors. Although no known exploits are currently reported in the wild, the vulnerability could be leveraged by malicious administrators or attackers who have gained administrative access to inject JavaScript that executes in the browsers of site visitors or other administrators, potentially leading to session hijacking, defacement, or further privilege escalation within the WordPress site environment.

Potential Impact

For European organizations using the Page Builder: Pagelayer plugin, this vulnerability poses a risk primarily to the integrity and confidentiality of their WordPress sites. Since exploitation requires administrator privileges, the threat is significant in scenarios where administrative accounts are compromised or insider threats exist. Successful exploitation could allow attackers to execute arbitrary JavaScript in the context of the website, potentially stealing session cookies, redirecting users to malicious sites, or injecting further malicious payloads. This could lead to data breaches, reputational damage, and loss of customer trust. In multi-site WordPress configurations, common in larger organizations and hosting providers, the risk is amplified as the vulnerability bypasses unfiltered_html restrictions, potentially affecting multiple sites under a single installation. Given the widespread use of WordPress across European businesses, especially SMEs and content-heavy organizations, the vulnerability could disrupt business operations and compliance with data protection regulations such as GDPR if personal data is exposed or manipulated.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should: 1) Immediately update the Page Builder: Pagelayer plugin to version 1.8.0 or later, where the vulnerability is addressed. 2) Restrict administrator privileges strictly, ensuring only trusted personnel have such access, and regularly audit admin accounts for suspicious activity. 3) Implement Web Application Firewall (WAF) rules that detect and block suspicious script injections in post headers and footers. 4) Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts on the website. 5) In multi-site environments, review and harden user role permissions and consider additional plugin-level restrictions to prevent unauthorized code insertion. 6) Monitor website content and logs for unusual script insertions or modifications. 7) Educate administrators about the risks of inserting untrusted code and enforce secure coding and content management practices. These steps go beyond generic patching by emphasizing privilege management, detection, and defense-in-depth strategies.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
WPScan
Date Reserved
2023-09-22T15:11:21.835Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682f60d40acd01a24926443e

Added to database: 5/22/2025, 5:37:24 PM

Last enriched: 7/8/2025, 9:14:16 AM

Last updated: 8/18/2025, 6:54:34 AM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats