CVE-2025-15267: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder
CVE-2025-15267 is a stored Cross-Site Scripting (XSS) vulnerability in the Bold Page Builder WordPress plugin affecting all versions up to 5. 5. 7. Authenticated users with contributor-level access or higher can exploit this flaw by injecting malicious scripts via the bt_bb_accordion_item shortcode due to improper input sanitization and output escaping. When other users visit the compromised pages, the injected scripts execute, potentially leading to session hijacking, defacement, or further attacks. The vulnerability has a CVSS score of 6. 4 (medium severity), reflecting its network exploitability with low attack complexity but requiring authenticated access. No known public exploits exist yet. European organizations using this plugin, especially those with contributor-level user roles, are at risk. Mitigation involves updating the plugin once a patch is available or restricting contributor privileges and sanitizing inputs manually.
AI Analysis
Technical Summary
CVE-2025-15267 is a stored Cross-Site Scripting vulnerability identified in the Bold Page Builder plugin for WordPress, affecting all versions up to and including 5.5.7. The vulnerability arises from insufficient sanitization and escaping of user-supplied attributes in the plugin's bt_bb_accordion_item shortcode. This flaw allows authenticated attackers with contributor-level access or higher to inject arbitrary JavaScript code into pages. When other users access these pages, the malicious scripts execute in their browsers, potentially leading to session hijacking, privilege escalation, or unauthorized actions within the WordPress site. The vulnerability requires no user interaction beyond visiting the compromised page and has a CVSS 3.1 base score of 6.4, indicating medium severity. The attack vector is network-based, with low attack complexity and privileges required at the contributor level, but no user interaction is needed. The scope is changed as the vulnerability affects other users beyond the attacker. No public exploits have been reported to date. The vulnerability is classified under CWE-79, which covers improper neutralization of input during web page generation. The lack of patch links suggests that a fix may not yet be publicly available, emphasizing the need for interim mitigations. This vulnerability is particularly concerning for WordPress sites that allow contributor-level users to add or edit content, as it enables persistent script injection that can affect all visitors to the compromised pages.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the confidentiality and integrity of their WordPress-based websites. Attackers with contributor access can inject malicious scripts that execute in the browsers of site visitors, potentially stealing session cookies, redirecting users to malicious sites, or performing unauthorized actions on behalf of users with higher privileges. This can lead to data breaches, defacement, loss of customer trust, and compliance violations under regulations such as GDPR. The vulnerability does not directly impact availability but can indirectly cause service disruptions if exploited for further attacks or site defacement. Organizations that rely heavily on WordPress for their web presence, especially those with multiple contributors or editors, are at higher risk. The medium CVSS score reflects the need for timely remediation but also indicates that exploitation requires some level of authenticated access, somewhat limiting the attack surface. However, insider threats or compromised contributor accounts could be leveraged by attackers to exploit this vulnerability.
Mitigation Recommendations
1. Immediately restrict contributor-level user permissions to trusted individuals only and review existing contributor accounts for suspicious activity. 2. Monitor and audit content submissions involving the bt_bb_accordion_item shortcode for suspicious or unexpected input. 3. Apply strict input validation and output escaping manually if possible, especially for shortcode attributes, until an official patch is released. 4. Keep the WordPress core, themes, and plugins up to date, and apply the Bold Page Builder plugin update as soon as it becomes available. 5. Implement Web Application Firewall (WAF) rules to detect and block suspicious script injection attempts targeting the vulnerable shortcode. 6. Educate content contributors about the risks of injecting untrusted content and enforce secure content creation policies. 7. Regularly back up website data to enable quick recovery in case of compromise. 8. Consider temporarily disabling or replacing the Bold Page Builder plugin if immediate patching is not possible and the risk is high.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain
CVE-2025-15267: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder
Description
CVE-2025-15267 is a stored Cross-Site Scripting (XSS) vulnerability in the Bold Page Builder WordPress plugin affecting all versions up to 5. 5. 7. Authenticated users with contributor-level access or higher can exploit this flaw by injecting malicious scripts via the bt_bb_accordion_item shortcode due to improper input sanitization and output escaping. When other users visit the compromised pages, the injected scripts execute, potentially leading to session hijacking, defacement, or further attacks. The vulnerability has a CVSS score of 6. 4 (medium severity), reflecting its network exploitability with low attack complexity but requiring authenticated access. No known public exploits exist yet. European organizations using this plugin, especially those with contributor-level user roles, are at risk. Mitigation involves updating the plugin once a patch is available or restricting contributor privileges and sanitizing inputs manually.
AI-Powered Analysis
Technical Analysis
CVE-2025-15267 is a stored Cross-Site Scripting vulnerability identified in the Bold Page Builder plugin for WordPress, affecting all versions up to and including 5.5.7. The vulnerability arises from insufficient sanitization and escaping of user-supplied attributes in the plugin's bt_bb_accordion_item shortcode. This flaw allows authenticated attackers with contributor-level access or higher to inject arbitrary JavaScript code into pages. When other users access these pages, the malicious scripts execute in their browsers, potentially leading to session hijacking, privilege escalation, or unauthorized actions within the WordPress site. The vulnerability requires no user interaction beyond visiting the compromised page and has a CVSS 3.1 base score of 6.4, indicating medium severity. The attack vector is network-based, with low attack complexity and privileges required at the contributor level, but no user interaction is needed. The scope is changed as the vulnerability affects other users beyond the attacker. No public exploits have been reported to date. The vulnerability is classified under CWE-79, which covers improper neutralization of input during web page generation. The lack of patch links suggests that a fix may not yet be publicly available, emphasizing the need for interim mitigations. This vulnerability is particularly concerning for WordPress sites that allow contributor-level users to add or edit content, as it enables persistent script injection that can affect all visitors to the compromised pages.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the confidentiality and integrity of their WordPress-based websites. Attackers with contributor access can inject malicious scripts that execute in the browsers of site visitors, potentially stealing session cookies, redirecting users to malicious sites, or performing unauthorized actions on behalf of users with higher privileges. This can lead to data breaches, defacement, loss of customer trust, and compliance violations under regulations such as GDPR. The vulnerability does not directly impact availability but can indirectly cause service disruptions if exploited for further attacks or site defacement. Organizations that rely heavily on WordPress for their web presence, especially those with multiple contributors or editors, are at higher risk. The medium CVSS score reflects the need for timely remediation but also indicates that exploitation requires some level of authenticated access, somewhat limiting the attack surface. However, insider threats or compromised contributor accounts could be leveraged by attackers to exploit this vulnerability.
Mitigation Recommendations
1. Immediately restrict contributor-level user permissions to trusted individuals only and review existing contributor accounts for suspicious activity. 2. Monitor and audit content submissions involving the bt_bb_accordion_item shortcode for suspicious or unexpected input. 3. Apply strict input validation and output escaping manually if possible, especially for shortcode attributes, until an official patch is released. 4. Keep the WordPress core, themes, and plugins up to date, and apply the Bold Page Builder plugin update as soon as it becomes available. 5. Implement Web Application Firewall (WAF) rules to detect and block suspicious script injection attempts targeting the vulnerable shortcode. 6. Educate content contributors about the risks of injecting untrusted content and enforce secure content creation policies. 7. Regularly back up website data to enable quick recovery in case of compromise. 8. Consider temporarily disabling or replacing the Bold Page Builder plugin if immediate patching is not possible and the risk is high.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-12-29T16:43:44.779Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6986d4e8f9fa50a62fed3fe2
Added to database: 2/7/2026, 6:00:08 AM
Last enriched: 2/7/2026, 6:14:28 AM
Last updated: 2/7/2026, 7:08:39 AM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2076: Improper Authorization in yeqifu warehouse
MediumCVE-2025-15491: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Post Slides
HighCVE-2025-13463: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder
MediumCVE-2025-12803: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in boldthemes Bold Page Builder
MediumCVE-2025-12159: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.