CVE-2023-5124: CWE-79 Cross-Site Scripting (XSS) in Unknown Page Builder: Pagelayer
The Page Builder: Pagelayer WordPress plugin before 1.8.0 doesn't prevent attackers with administrator privileges from inserting malicious JavaScript inside a post's header or footer code, even when unfiltered_html is disallowed, such as in multi-site WordPress configurations.
AI Analysis
Technical Summary
CVE-2023-5124 is a Cross-Site Scripting (XSS) vulnerability identified in the WordPress plugin 'Page Builder: Pagelayer' versions prior to 1.8.0, specifically noted in version 1.3.2. This vulnerability arises because the plugin fails to properly sanitize or restrict the insertion of malicious JavaScript code by users with administrator privileges into the header or footer sections of posts. Notably, this issue persists even when the WordPress configuration disallows unfiltered_html capabilities, such as in multi-site environments where stricter content filtering is typically enforced. The vulnerability is classified under CWE-79, indicating improper neutralization of input during web page generation, which can lead to script injection. The CVSS v3.1 base score is 4.8 (medium severity), reflecting that exploitation requires high privileges (administrator), user interaction (such as viewing the malicious content), and results in limited confidentiality and integrity impacts without affecting availability. The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially vulnerable component, potentially impacting other users or site visitors. Although no known exploits are currently reported in the wild, the vulnerability could be leveraged by malicious administrators or attackers who have gained administrative access to inject JavaScript that executes in the browsers of site visitors or other administrators, potentially leading to session hijacking, defacement, or further privilege escalation within the WordPress site environment.
Potential Impact
For European organizations using the Page Builder: Pagelayer plugin, this vulnerability poses a risk primarily to the integrity and confidentiality of their WordPress sites. Since exploitation requires administrator privileges, the threat is significant in scenarios where administrative accounts are compromised or insider threats exist. Successful exploitation could allow attackers to execute arbitrary JavaScript in the context of the website, potentially stealing session cookies, redirecting users to malicious sites, or injecting further malicious payloads. This could lead to data breaches, reputational damage, and loss of customer trust. In multi-site WordPress configurations, common in larger organizations and hosting providers, the risk is amplified as the vulnerability bypasses unfiltered_html restrictions, potentially affecting multiple sites under a single installation. Given the widespread use of WordPress across European businesses, especially SMEs and content-heavy organizations, the vulnerability could disrupt business operations and compliance with data protection regulations such as GDPR if personal data is exposed or manipulated.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Immediately update the Page Builder: Pagelayer plugin to version 1.8.0 or later, where the vulnerability is addressed. 2) Restrict administrator privileges strictly, ensuring only trusted personnel have such access, and regularly audit admin accounts for suspicious activity. 3) Implement Web Application Firewall (WAF) rules that detect and block suspicious script injections in post headers and footers. 4) Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts on the website. 5) In multi-site environments, review and harden user role permissions and consider additional plugin-level restrictions to prevent unauthorized code insertion. 6) Monitor website content and logs for unusual script insertions or modifications. 7) Educate administrators about the risks of inserting untrusted code and enforce secure coding and content management practices. These steps go beyond generic patching by emphasizing privilege management, detection, and defense-in-depth strategies.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2023-5124: CWE-79 Cross-Site Scripting (XSS) in Unknown Page Builder: Pagelayer
Description
The Page Builder: Pagelayer WordPress plugin before 1.8.0 doesn't prevent attackers with administrator privileges from inserting malicious JavaScript inside a post's header or footer code, even when unfiltered_html is disallowed, such as in multi-site WordPress configurations.
AI-Powered Analysis
Technical Analysis
CVE-2023-5124 is a Cross-Site Scripting (XSS) vulnerability identified in the WordPress plugin 'Page Builder: Pagelayer' versions prior to 1.8.0, specifically noted in version 1.3.2. This vulnerability arises because the plugin fails to properly sanitize or restrict the insertion of malicious JavaScript code by users with administrator privileges into the header or footer sections of posts. Notably, this issue persists even when the WordPress configuration disallows unfiltered_html capabilities, such as in multi-site environments where stricter content filtering is typically enforced. The vulnerability is classified under CWE-79, indicating improper neutralization of input during web page generation, which can lead to script injection. The CVSS v3.1 base score is 4.8 (medium severity), reflecting that exploitation requires high privileges (administrator), user interaction (such as viewing the malicious content), and results in limited confidentiality and integrity impacts without affecting availability. The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially vulnerable component, potentially impacting other users or site visitors. Although no known exploits are currently reported in the wild, the vulnerability could be leveraged by malicious administrators or attackers who have gained administrative access to inject JavaScript that executes in the browsers of site visitors or other administrators, potentially leading to session hijacking, defacement, or further privilege escalation within the WordPress site environment.
Potential Impact
For European organizations using the Page Builder: Pagelayer plugin, this vulnerability poses a risk primarily to the integrity and confidentiality of their WordPress sites. Since exploitation requires administrator privileges, the threat is significant in scenarios where administrative accounts are compromised or insider threats exist. Successful exploitation could allow attackers to execute arbitrary JavaScript in the context of the website, potentially stealing session cookies, redirecting users to malicious sites, or injecting further malicious payloads. This could lead to data breaches, reputational damage, and loss of customer trust. In multi-site WordPress configurations, common in larger organizations and hosting providers, the risk is amplified as the vulnerability bypasses unfiltered_html restrictions, potentially affecting multiple sites under a single installation. Given the widespread use of WordPress across European businesses, especially SMEs and content-heavy organizations, the vulnerability could disrupt business operations and compliance with data protection regulations such as GDPR if personal data is exposed or manipulated.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Immediately update the Page Builder: Pagelayer plugin to version 1.8.0 or later, where the vulnerability is addressed. 2) Restrict administrator privileges strictly, ensuring only trusted personnel have such access, and regularly audit admin accounts for suspicious activity. 3) Implement Web Application Firewall (WAF) rules that detect and block suspicious script injections in post headers and footers. 4) Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts on the website. 5) In multi-site environments, review and harden user role permissions and consider additional plugin-level restrictions to prevent unauthorized code insertion. 6) Monitor website content and logs for unusual script insertions or modifications. 7) Educate administrators about the risks of inserting untrusted code and enforce secure coding and content management practices. These steps go beyond generic patching by emphasizing privilege management, detection, and defense-in-depth strategies.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- WPScan
- Date Reserved
- 2023-09-22T15:11:21.835Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682f60d40acd01a24926443e
Added to database: 5/22/2025, 5:37:24 PM
Last enriched: 7/8/2025, 9:14:16 AM
Last updated: 10/16/2025, 3:16:13 PM
Views: 21
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-61543: n/a
HighCVE-2025-61541: n/a
HighCVE-2025-61536: n/a
HighCVE-2025-41254: CWE-352: Cross-Site Request Forgery (CSRF) in VMware Spring Framework
MediumCVE-2025-36002: Password in Configuration File in IBM Sterling B2B Integrator
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.