CVE-2025-12159: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder
CVE-2025-12159 is a stored Cross-Site Scripting (XSS) vulnerability in the Bold Page Builder WordPress plugin affecting all versions up to 5. 4. 8. Authenticated users with contributor-level access or higher can exploit insufficient input sanitization in the bt_bb_raw_content shortcode to inject malicious scripts. These scripts execute whenever any user views the compromised page, potentially leading to session hijacking, privilege escalation, or unauthorized actions. The vulnerability has a CVSS score of 6. 4 (medium severity) and does not require user interaction but does require authenticated access. No known exploits are currently reported in the wild. European organizations using WordPress sites with this plugin are at risk, especially those with multiple contributors. Mitigation involves updating the plugin once a patch is available or restricting contributor permissions and sanitizing inputs manually.
AI Analysis
Technical Summary
CVE-2025-12159 is a stored Cross-Site Scripting (XSS) vulnerability identified in the Bold Page Builder plugin for WordPress, specifically affecting all versions up to and including 5.4.8. The vulnerability arises from improper neutralization of input during web page generation, classified under CWE-79. The issue is located in the plugin's bt_bb_raw_content shortcode, where user-supplied attributes are not sufficiently sanitized or escaped before being rendered on pages. This flaw allows authenticated attackers with contributor-level privileges or higher to inject arbitrary JavaScript code that is persistently stored and executed in the context of any user who visits the affected page. The attack vector requires network access (remote) and low attack complexity, with privileges required at the contributor level but no user interaction needed for exploitation. The vulnerability impacts confidentiality and integrity by enabling script execution that can hijack sessions, steal cookies, or perform unauthorized actions on behalf of users. The scope is considered changed (S:C) because the vulnerability can affect other users beyond the attacker. The CVSS v3.1 base score is 6.4, reflecting a medium severity level. Currently, there are no known exploits in the wild, and no official patches have been linked yet. The vulnerability was reserved in October 2025 and published in February 2026. The Bold Page Builder plugin is widely used in WordPress sites for page design, making this vulnerability relevant to many web environments that rely on this plugin for content management and presentation.
Potential Impact
For European organizations, this vulnerability poses a significant risk to websites using the Bold Page Builder plugin, especially those with multiple contributors or editors. Exploitation can lead to unauthorized script execution, enabling attackers to steal session tokens, perform actions on behalf of legitimate users, or deface websites. This can result in data breaches, loss of user trust, and potential regulatory penalties under GDPR if personal data is compromised. The persistent nature of stored XSS increases the risk as malicious scripts remain active until removed. Organizations with public-facing WordPress sites, particularly in sectors like e-commerce, media, and government, are at higher risk due to the potential impact on customer data and service integrity. The medium severity score indicates moderate urgency, but the ease of exploitation by authenticated users elevates the threat in environments with multiple contributors. Additionally, the cross-site scripting can facilitate further attacks such as phishing or malware distribution, amplifying the potential damage.
Mitigation Recommendations
Immediate mitigation should focus on restricting contributor-level access to trusted users only, minimizing the risk of malicious input. Administrators should monitor and audit content created via the bt_bb_raw_content shortcode for suspicious scripts. Until an official patch is released, consider disabling or removing the Bold Page Builder plugin if feasible or replacing it with alternative page builders that follow secure coding practices. Implement Web Application Firewalls (WAF) with rules to detect and block common XSS payloads targeting this vulnerability. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts on affected sites. Educate content contributors about safe input practices and the risks of injecting untrusted code. Once a patch becomes available, prioritize updating the plugin promptly. Additionally, perform regular security scans and penetration tests focusing on WordPress plugins to identify similar vulnerabilities proactively.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden
CVE-2025-12159: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder
Description
CVE-2025-12159 is a stored Cross-Site Scripting (XSS) vulnerability in the Bold Page Builder WordPress plugin affecting all versions up to 5. 4. 8. Authenticated users with contributor-level access or higher can exploit insufficient input sanitization in the bt_bb_raw_content shortcode to inject malicious scripts. These scripts execute whenever any user views the compromised page, potentially leading to session hijacking, privilege escalation, or unauthorized actions. The vulnerability has a CVSS score of 6. 4 (medium severity) and does not require user interaction but does require authenticated access. No known exploits are currently reported in the wild. European organizations using WordPress sites with this plugin are at risk, especially those with multiple contributors. Mitigation involves updating the plugin once a patch is available or restricting contributor permissions and sanitizing inputs manually.
AI-Powered Analysis
Technical Analysis
CVE-2025-12159 is a stored Cross-Site Scripting (XSS) vulnerability identified in the Bold Page Builder plugin for WordPress, specifically affecting all versions up to and including 5.4.8. The vulnerability arises from improper neutralization of input during web page generation, classified under CWE-79. The issue is located in the plugin's bt_bb_raw_content shortcode, where user-supplied attributes are not sufficiently sanitized or escaped before being rendered on pages. This flaw allows authenticated attackers with contributor-level privileges or higher to inject arbitrary JavaScript code that is persistently stored and executed in the context of any user who visits the affected page. The attack vector requires network access (remote) and low attack complexity, with privileges required at the contributor level but no user interaction needed for exploitation. The vulnerability impacts confidentiality and integrity by enabling script execution that can hijack sessions, steal cookies, or perform unauthorized actions on behalf of users. The scope is considered changed (S:C) because the vulnerability can affect other users beyond the attacker. The CVSS v3.1 base score is 6.4, reflecting a medium severity level. Currently, there are no known exploits in the wild, and no official patches have been linked yet. The vulnerability was reserved in October 2025 and published in February 2026. The Bold Page Builder plugin is widely used in WordPress sites for page design, making this vulnerability relevant to many web environments that rely on this plugin for content management and presentation.
Potential Impact
For European organizations, this vulnerability poses a significant risk to websites using the Bold Page Builder plugin, especially those with multiple contributors or editors. Exploitation can lead to unauthorized script execution, enabling attackers to steal session tokens, perform actions on behalf of legitimate users, or deface websites. This can result in data breaches, loss of user trust, and potential regulatory penalties under GDPR if personal data is compromised. The persistent nature of stored XSS increases the risk as malicious scripts remain active until removed. Organizations with public-facing WordPress sites, particularly in sectors like e-commerce, media, and government, are at higher risk due to the potential impact on customer data and service integrity. The medium severity score indicates moderate urgency, but the ease of exploitation by authenticated users elevates the threat in environments with multiple contributors. Additionally, the cross-site scripting can facilitate further attacks such as phishing or malware distribution, amplifying the potential damage.
Mitigation Recommendations
Immediate mitigation should focus on restricting contributor-level access to trusted users only, minimizing the risk of malicious input. Administrators should monitor and audit content created via the bt_bb_raw_content shortcode for suspicious scripts. Until an official patch is released, consider disabling or removing the Bold Page Builder plugin if feasible or replacing it with alternative page builders that follow secure coding practices. Implement Web Application Firewalls (WAF) with rules to detect and block common XSS payloads targeting this vulnerability. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts on affected sites. Educate content contributors about safe input practices and the risks of injecting untrusted code. Once a patch becomes available, prioritize updating the plugin promptly. Additionally, perform regular security scans and penetration tests focusing on WordPress plugins to identify similar vulnerabilities proactively.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-10-24T13:23:22.116Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6986d4e8f9fa50a62fed3fd4
Added to database: 2/7/2026, 6:00:08 AM
Last enriched: 2/7/2026, 6:15:02 AM
Last updated: 2/7/2026, 7:08:13 AM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2076: Improper Authorization in yeqifu warehouse
MediumCVE-2025-15491: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Post Slides
HighCVE-2025-15267: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder
MediumCVE-2025-13463: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder
MediumCVE-2025-12803: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in boldthemes Bold Page Builder
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.