Skip to main content

CVE-2024-8426: CWE-79 Cross-Site Scripting (XSS) in Unknown Page Builder: Pagelayer

Medium
VulnerabilityCVE-2024-8426cvecve-2024-8426cwe-79
Published: Thu May 15 2025 (05/15/2025, 20:07:15 UTC)
Source: CVE
Vendor/Project: Unknown
Product: Page Builder: Pagelayer

Description

The Page Builder: Pagelayer WordPress plugin before 1.8.8 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Cross-Site Scripting attacks even when unfiltered_html is disallowed

AI-Powered Analysis

AILast updated: 07/04/2025, 15:42:46 UTC

Technical Analysis

CVE-2024-8426 is a Cross-Site Scripting (XSS) vulnerability classified under CWE-79 affecting the WordPress plugin 'Page Builder: Pagelayer' in versions prior to 1.8.8. This vulnerability arises because the plugin fails to properly sanitize and escape certain settings, which can be manipulated by users with high privileges, such as administrators. Despite WordPress's unfiltered_html capability being disabled (which normally restricts the ability to post unfiltered HTML), this vulnerability allows these privileged users to inject malicious scripts. The vulnerability requires high privilege (admin-level) access and user interaction to trigger the XSS payload. The CVSS v3.1 score is 4.8 (medium severity), reflecting that the attack vector is network-based with low attack complexity, but requires high privileges and user interaction. The impact primarily affects confidentiality and integrity, as the injected scripts can execute in the context of the affected site, potentially leading to session hijacking, privilege escalation, or defacement. Availability impact is not significant. No known exploits are currently reported in the wild, and no patches are linked yet, indicating the need for vigilance and timely updates once available. The vulnerability affects the Page Builder: Pagelayer plugin, a tool used to create and manage page layouts within WordPress sites, which is popular among website administrators for ease of content creation.

Potential Impact

For European organizations using WordPress sites with the Page Builder: Pagelayer plugin, this vulnerability poses a risk primarily to the confidentiality and integrity of their web applications. Attackers with admin-level access could inject malicious scripts that execute in the browsers of other users or administrators, potentially leading to session hijacking, theft of sensitive information, or unauthorized actions performed on behalf of legitimate users. This could result in data breaches, reputational damage, and compliance violations under regulations such as GDPR. Although the vulnerability requires high privilege access, it could be exploited internally or through compromised admin accounts. Given the widespread use of WordPress in Europe for corporate, governmental, and e-commerce websites, the vulnerability could affect a broad range of sectors. The lack of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially as attackers often develop exploits after public disclosure. The medium severity rating suggests moderate urgency for mitigation to prevent potential exploitation.

Mitigation Recommendations

European organizations should take the following specific steps to mitigate this vulnerability: 1) Immediately verify if the Page Builder: Pagelayer plugin is installed and identify the version in use. 2) Monitor official sources for the release of a security patch or update from the plugin developers and apply it promptly once available. 3) In the interim, restrict admin-level access to trusted personnel only and enforce strong authentication mechanisms such as multi-factor authentication (MFA) to reduce the risk of compromised admin accounts. 4) Conduct a thorough audit of existing admin accounts and remove or disable any unnecessary or inactive accounts. 5) Implement Content Security Policy (CSP) headers to limit the impact of potential XSS attacks by restricting the sources from which scripts can be loaded. 6) Regularly scan the website for malicious scripts or unauthorized changes using specialized security plugins or external services. 7) Educate administrators about the risks of XSS and safe handling of plugin settings to avoid inadvertent injection of malicious content. 8) Consider temporarily disabling or replacing the plugin if a patch is not available and the risk is deemed unacceptable.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
WPScan
Date Reserved
2024-09-04T14:29:13.451Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f91484d88663aeb902

Added to database: 5/20/2025, 6:59:05 PM

Last enriched: 7/4/2025, 3:42:46 PM

Last updated: 8/4/2025, 7:43:27 AM

Views: 17

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats