CVE-2024-8618: CWE-79 Cross-Site Scripting (XSS) in Unknown Page Builder: Pagelayer
The Page Builder: Pagelayer WordPress plugin before 1.9.0 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
AI Analysis
Technical Summary
CVE-2024-8618 is a medium-severity vulnerability classified as CWE-79 (Cross-Site Scripting, XSS) affecting the WordPress plugin 'Page Builder: Pagelayer' in versions prior to 1.9.0. The vulnerability arises because the plugin fails to properly sanitize and escape certain settings. This flaw allows users with high privileges, such as administrators, to inject and store malicious scripts within the plugin's settings. Notably, this attack vector remains viable even when the WordPress capability 'unfiltered_html' is disabled, which is commonly the case in multisite environments to restrict HTML input. The vulnerability requires high privilege (admin) access and user interaction to trigger the stored XSS payload, which can then execute in the context of other users viewing the affected pages or admin panels. The CVSS v3.1 score is 4.8 (medium), reflecting a network attack vector with low attack complexity, requiring high privileges and user interaction, and resulting in limited confidentiality and integrity impacts without affecting availability. No known exploits are currently reported in the wild, and no official patches or updates are linked yet, though upgrading to version 1.9.0 or later is implied to remediate the issue. This vulnerability could be leveraged to perform actions such as session hijacking, privilege escalation, or injecting malicious content, potentially compromising site administrators or users who access the affected pages or admin interfaces.
Potential Impact
For European organizations using WordPress sites with the Page Builder: Pagelayer plugin, this vulnerability poses a risk primarily to site integrity and confidentiality. An attacker with admin privileges could inject malicious scripts that execute in other users' browsers, potentially stealing session cookies, performing unauthorized actions, or defacing content. In multisite WordPress setups, which are common in enterprise and educational institutions across Europe, the inability to rely on 'unfiltered_html' to block such attacks increases risk. While the vulnerability does not directly affect availability, the reputational damage and potential data leakage could be significant, especially for organizations handling sensitive or regulated data under GDPR. Attackers exploiting this vulnerability could gain footholds for further lateral movement or persistent access. However, the requirement for high privilege limits the attack surface to insiders or compromised admin accounts, reducing the likelihood of widespread exploitation but emphasizing the need for strong internal controls.
Mitigation Recommendations
European organizations should immediately verify if their WordPress installations use the Page Builder: Pagelayer plugin and determine the version in use. Upgrading to version 1.9.0 or later, where the vulnerability is fixed, is the primary mitigation step. Until patched, restrict admin access strictly to trusted personnel and enforce strong authentication mechanisms such as multi-factor authentication (MFA) to reduce the risk of privilege abuse. Additionally, implement Content Security Policy (CSP) headers to limit the impact of potential XSS payloads. Regularly audit plugin settings and user inputs for suspicious content. For multisite environments, review and tighten capability assignments and consider additional input sanitization plugins or web application firewalls (WAFs) that can detect and block XSS attempts. Monitoring logs for unusual admin activity and conducting periodic security assessments of WordPress plugins will further reduce risk.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2024-8618: CWE-79 Cross-Site Scripting (XSS) in Unknown Page Builder: Pagelayer
Description
The Page Builder: Pagelayer WordPress plugin before 1.9.0 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
AI-Powered Analysis
Technical Analysis
CVE-2024-8618 is a medium-severity vulnerability classified as CWE-79 (Cross-Site Scripting, XSS) affecting the WordPress plugin 'Page Builder: Pagelayer' in versions prior to 1.9.0. The vulnerability arises because the plugin fails to properly sanitize and escape certain settings. This flaw allows users with high privileges, such as administrators, to inject and store malicious scripts within the plugin's settings. Notably, this attack vector remains viable even when the WordPress capability 'unfiltered_html' is disabled, which is commonly the case in multisite environments to restrict HTML input. The vulnerability requires high privilege (admin) access and user interaction to trigger the stored XSS payload, which can then execute in the context of other users viewing the affected pages or admin panels. The CVSS v3.1 score is 4.8 (medium), reflecting a network attack vector with low attack complexity, requiring high privileges and user interaction, and resulting in limited confidentiality and integrity impacts without affecting availability. No known exploits are currently reported in the wild, and no official patches or updates are linked yet, though upgrading to version 1.9.0 or later is implied to remediate the issue. This vulnerability could be leveraged to perform actions such as session hijacking, privilege escalation, or injecting malicious content, potentially compromising site administrators or users who access the affected pages or admin interfaces.
Potential Impact
For European organizations using WordPress sites with the Page Builder: Pagelayer plugin, this vulnerability poses a risk primarily to site integrity and confidentiality. An attacker with admin privileges could inject malicious scripts that execute in other users' browsers, potentially stealing session cookies, performing unauthorized actions, or defacing content. In multisite WordPress setups, which are common in enterprise and educational institutions across Europe, the inability to rely on 'unfiltered_html' to block such attacks increases risk. While the vulnerability does not directly affect availability, the reputational damage and potential data leakage could be significant, especially for organizations handling sensitive or regulated data under GDPR. Attackers exploiting this vulnerability could gain footholds for further lateral movement or persistent access. However, the requirement for high privilege limits the attack surface to insiders or compromised admin accounts, reducing the likelihood of widespread exploitation but emphasizing the need for strong internal controls.
Mitigation Recommendations
European organizations should immediately verify if their WordPress installations use the Page Builder: Pagelayer plugin and determine the version in use. Upgrading to version 1.9.0 or later, where the vulnerability is fixed, is the primary mitigation step. Until patched, restrict admin access strictly to trusted personnel and enforce strong authentication mechanisms such as multi-factor authentication (MFA) to reduce the risk of privilege abuse. Additionally, implement Content Security Policy (CSP) headers to limit the impact of potential XSS payloads. Regularly audit plugin settings and user inputs for suspicious content. For multisite environments, review and tighten capability assignments and consider additional input sanitization plugins or web application firewalls (WAFs) that can detect and block XSS attempts. Monitoring logs for unusual admin activity and conducting periodic security assessments of WordPress plugins will further reduce risk.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- WPScan
- Date Reserved
- 2024-09-09T18:51:57.068Z
- Cisa Enriched
- false
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0fa1484d88663aec295
Added to database: 5/20/2025, 6:59:06 PM
Last enriched: 7/4/2025, 8:27:32 AM
Last updated: 8/11/2025, 2:10:25 AM
Views: 13
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.