CVE-2024-5255: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Brainstorm Force Ultimate Addons for WPBakery
CVE-2024-5255 is a stored cross-site scripting (XSS) vulnerability in the Ultimate Addons for WPBakery WordPress plugin, affecting all versions up to 3. 19. 20. It arises from improper input sanitization and output escaping in the ultimate_dual_color shortcode, allowing authenticated users with contributor-level access or higher to inject malicious scripts. These scripts execute whenever any user views the compromised page, potentially leading to session hijacking, defacement, or further attacks. The vulnerability has a CVSS score of 6. 4 (medium severity), requires no user interaction, and has not been observed exploited in the wild. Organizations using this plugin should prioritize patching or applying mitigations to prevent exploitation, especially given the widespread use of WordPress and this popular addon. The risk is particularly relevant for websites allowing contributor-level users to create or edit content. Countries with large WordPress user bases and significant web publishing sectors, such as the United States, India, Brazil, Germany, and the United Kingdom, are most likely to be affected.
AI Analysis
Technical Summary
CVE-2024-5255 is a stored cross-site scripting (XSS) vulnerability identified in the Ultimate Addons for WPBakery plugin for WordPress, specifically in the ultimate_dual_color shortcode. This vulnerability exists due to insufficient sanitization and escaping of user-supplied attributes before rendering them on web pages. Authenticated attackers with contributor-level or higher privileges can exploit this flaw by injecting arbitrary JavaScript code into pages or posts. When other users visit these compromised pages, the injected scripts execute in their browsers, potentially allowing attackers to steal session cookies, perform actions on behalf of users, or deliver further malicious payloads. The vulnerability affects all plugin versions up to and including 3.19.20. The CVSS 3.1 base score is 6.4, reflecting a medium severity level, with an attack vector over the network, low attack complexity, requiring privileges (PR:L), no user interaction, and a scope change (S:C) indicating impact beyond the vulnerable component. Confidentiality and integrity are impacted, but availability is not. No known public exploits have been reported yet. The vulnerability was publicly disclosed on July 17, 2024, and no official patches have been linked in the provided data. The flaw stems from a common web application security issue classified under CWE-79 (Improper Neutralization of Input During Web Page Generation).
Potential Impact
The primary impact of this vulnerability is the potential for attackers to execute arbitrary JavaScript in the context of affected websites, leading to session hijacking, unauthorized actions, defacement, or distribution of malware. Since the vulnerability requires contributor-level access, attackers must first compromise or gain such privileges, which may be feasible on sites with weak user management or social engineering. The scope change in the CVSS vector indicates that the vulnerability can affect components beyond the plugin itself, potentially compromising the entire site or user base. For organizations relying on WordPress with this plugin, especially those with multiple content contributors, the risk includes data leakage, loss of user trust, and reputational damage. Although no known exploits are currently in the wild, the widespread use of WordPress and the plugin increases the likelihood of future exploitation attempts. The vulnerability does not impact availability, so denial-of-service is not a concern here. However, the confidentiality and integrity of user data and site content are at risk.
Mitigation Recommendations
Organizations should immediately audit their WordPress installations to identify the presence and version of the Ultimate Addons for WPBakery plugin. If possible, upgrade to a patched version once available from Brainstorm Force. In the absence of an official patch, administrators should restrict contributor-level access to trusted users only and implement strict content moderation workflows to review and sanitize user-generated content before publishing. Employing Web Application Firewalls (WAFs) with custom rules to detect and block suspicious script injections in shortcode attributes can provide interim protection. Additionally, enabling Content Security Policy (CSP) headers can help mitigate the impact of XSS by restricting script execution sources. Regularly scanning the site for injected scripts or anomalous content is recommended. Educating content contributors about safe input practices and monitoring user activity logs for unusual behavior can further reduce risk. Finally, ensure that all other WordPress components and plugins are kept up to date to minimize the attack surface.
Affected Countries
United States, India, Brazil, Germany, United Kingdom, Canada, Australia, France, Italy, Spain
CVE-2024-5255: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Brainstorm Force Ultimate Addons for WPBakery
Description
CVE-2024-5255 is a stored cross-site scripting (XSS) vulnerability in the Ultimate Addons for WPBakery WordPress plugin, affecting all versions up to 3. 19. 20. It arises from improper input sanitization and output escaping in the ultimate_dual_color shortcode, allowing authenticated users with contributor-level access or higher to inject malicious scripts. These scripts execute whenever any user views the compromised page, potentially leading to session hijacking, defacement, or further attacks. The vulnerability has a CVSS score of 6. 4 (medium severity), requires no user interaction, and has not been observed exploited in the wild. Organizations using this plugin should prioritize patching or applying mitigations to prevent exploitation, especially given the widespread use of WordPress and this popular addon. The risk is particularly relevant for websites allowing contributor-level users to create or edit content. Countries with large WordPress user bases and significant web publishing sectors, such as the United States, India, Brazil, Germany, and the United Kingdom, are most likely to be affected.
AI-Powered Analysis
Technical Analysis
CVE-2024-5255 is a stored cross-site scripting (XSS) vulnerability identified in the Ultimate Addons for WPBakery plugin for WordPress, specifically in the ultimate_dual_color shortcode. This vulnerability exists due to insufficient sanitization and escaping of user-supplied attributes before rendering them on web pages. Authenticated attackers with contributor-level or higher privileges can exploit this flaw by injecting arbitrary JavaScript code into pages or posts. When other users visit these compromised pages, the injected scripts execute in their browsers, potentially allowing attackers to steal session cookies, perform actions on behalf of users, or deliver further malicious payloads. The vulnerability affects all plugin versions up to and including 3.19.20. The CVSS 3.1 base score is 6.4, reflecting a medium severity level, with an attack vector over the network, low attack complexity, requiring privileges (PR:L), no user interaction, and a scope change (S:C) indicating impact beyond the vulnerable component. Confidentiality and integrity are impacted, but availability is not. No known public exploits have been reported yet. The vulnerability was publicly disclosed on July 17, 2024, and no official patches have been linked in the provided data. The flaw stems from a common web application security issue classified under CWE-79 (Improper Neutralization of Input During Web Page Generation).
Potential Impact
The primary impact of this vulnerability is the potential for attackers to execute arbitrary JavaScript in the context of affected websites, leading to session hijacking, unauthorized actions, defacement, or distribution of malware. Since the vulnerability requires contributor-level access, attackers must first compromise or gain such privileges, which may be feasible on sites with weak user management or social engineering. The scope change in the CVSS vector indicates that the vulnerability can affect components beyond the plugin itself, potentially compromising the entire site or user base. For organizations relying on WordPress with this plugin, especially those with multiple content contributors, the risk includes data leakage, loss of user trust, and reputational damage. Although no known exploits are currently in the wild, the widespread use of WordPress and the plugin increases the likelihood of future exploitation attempts. The vulnerability does not impact availability, so denial-of-service is not a concern here. However, the confidentiality and integrity of user data and site content are at risk.
Mitigation Recommendations
Organizations should immediately audit their WordPress installations to identify the presence and version of the Ultimate Addons for WPBakery plugin. If possible, upgrade to a patched version once available from Brainstorm Force. In the absence of an official patch, administrators should restrict contributor-level access to trusted users only and implement strict content moderation workflows to review and sanitize user-generated content before publishing. Employing Web Application Firewalls (WAFs) with custom rules to detect and block suspicious script injections in shortcode attributes can provide interim protection. Additionally, enabling Content Security Policy (CSP) headers can help mitigate the impact of XSS by restricting script execution sources. Regularly scanning the site for injected scripts or anomalous content is recommended. Educating content contributors about safe input practices and monitoring user activity logs for unusual behavior can further reduce risk. Finally, ensure that all other WordPress components and plugins are kept up to date to minimize the attack surface.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2024-05-22T21:51:12.207Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6be2b7ef31ef0b55bc36
Added to database: 2/25/2026, 9:38:42 PM
Last enriched: 2/26/2026, 2:29:36 AM
Last updated: 2/26/2026, 8:06:43 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25191: Uncontrolled Search Path Element in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-23703: Incorrect default permissions in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-1311: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in bearsthemes Worry Proof Backup
HighFinding Signal in the Noise: Lessons Learned Running a Honeypot with AI Assistance [Guest Diary], (Tue, Feb 24th)
MediumCVE-2026-2506: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motahar1 EM Cost Calculator
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.