CVE-2025-1777: CWE-862 Missing Authorization in SeaTheme BM Content Builder
The BM Content Builder plugin for WordPress is vulnerable to unauthorized modification of data to a missing capability check on the 'ux_cb_page_options_save' function in all versions up to, and including, 3.16.2.1. This makes it possible for authenticated attackers, with subscriber-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
AI Analysis
Technical Summary
CVE-2025-1777 is a security vulnerability identified in the BM Content Builder plugin developed by SeaTheme for WordPress. This vulnerability stems from a missing authorization check (CWE-862) in the function 'ux_cb_page_options_save' across all versions up to and including 3.16.2.1. Specifically, the plugin fails to properly verify whether an authenticated user has the necessary capabilities before allowing modifications to page options. As a result, any authenticated user with at least subscriber-level access can exploit this flaw to inject arbitrary web scripts into pages. These injected scripts execute whenever any user accesses the compromised page, effectively enabling cross-site scripting (XSS) attacks. The vulnerability has a CVSS 3.1 base score of 6.4, indicating a medium severity level. The attack vector is network-based (remote), requires low attack complexity, and privileges at the level of an authenticated user (PR:L). No user interaction is needed for the exploit to succeed, and the scope is changed, meaning the vulnerability affects components beyond the initially vulnerable plugin, potentially impacting the entire WordPress site. The confidentiality and integrity of the affected systems are at risk due to the ability to inject malicious scripts, which could lead to session hijacking, credential theft, or further compromise of the website and its visitors. Availability impact is not significant. No known exploits are currently reported in the wild, and no patches have been linked yet, emphasizing the need for immediate attention and mitigation by site administrators using this plugin.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially for those relying on WordPress sites with the BM Content Builder plugin installed. The ability for low-privileged authenticated users to inject malicious scripts can lead to data breaches involving personal data of EU citizens, potentially violating GDPR regulations. Attackers could leverage this to steal user credentials, perform phishing attacks, or distribute malware, damaging organizational reputation and causing financial loss. Since WordPress is widely used across Europe for corporate websites, e-commerce platforms, and informational portals, the scope of impact is broad. The vulnerability could also be exploited to deface websites or disrupt user trust, which is critical for businesses operating in competitive markets. Additionally, compromised sites might be blacklisted by search engines or security services, further affecting business operations. The medium severity rating suggests that while the vulnerability is not immediately catastrophic, it is sufficiently serious to warrant prompt remediation to prevent escalation or chaining with other vulnerabilities.
Mitigation Recommendations
Organizations should immediately audit their WordPress installations to identify the presence of the BM Content Builder plugin, particularly versions up to 3.16.2.1. Until an official patch is released, administrators should restrict subscriber-level user capabilities or disable the plugin if feasible. Implementing strict user role management and minimizing the number of users with authenticated access can reduce the attack surface. Web Application Firewalls (WAFs) with custom rules to detect and block suspicious script injections targeting the vulnerable function can provide temporary protection. Monitoring logs for unusual page modifications or script injections is also recommended. Once a patch becomes available, prompt application of updates is critical. Additionally, organizations should educate users about the risks of unauthorized script execution and enforce multi-factor authentication to reduce the risk of compromised accounts being used to exploit this vulnerability.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden
CVE-2025-1777: CWE-862 Missing Authorization in SeaTheme BM Content Builder
Description
The BM Content Builder plugin for WordPress is vulnerable to unauthorized modification of data to a missing capability check on the 'ux_cb_page_options_save' function in all versions up to, and including, 3.16.2.1. This makes it possible for authenticated attackers, with subscriber-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
AI-Powered Analysis
Technical Analysis
CVE-2025-1777 is a security vulnerability identified in the BM Content Builder plugin developed by SeaTheme for WordPress. This vulnerability stems from a missing authorization check (CWE-862) in the function 'ux_cb_page_options_save' across all versions up to and including 3.16.2.1. Specifically, the plugin fails to properly verify whether an authenticated user has the necessary capabilities before allowing modifications to page options. As a result, any authenticated user with at least subscriber-level access can exploit this flaw to inject arbitrary web scripts into pages. These injected scripts execute whenever any user accesses the compromised page, effectively enabling cross-site scripting (XSS) attacks. The vulnerability has a CVSS 3.1 base score of 6.4, indicating a medium severity level. The attack vector is network-based (remote), requires low attack complexity, and privileges at the level of an authenticated user (PR:L). No user interaction is needed for the exploit to succeed, and the scope is changed, meaning the vulnerability affects components beyond the initially vulnerable plugin, potentially impacting the entire WordPress site. The confidentiality and integrity of the affected systems are at risk due to the ability to inject malicious scripts, which could lead to session hijacking, credential theft, or further compromise of the website and its visitors. Availability impact is not significant. No known exploits are currently reported in the wild, and no patches have been linked yet, emphasizing the need for immediate attention and mitigation by site administrators using this plugin.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially for those relying on WordPress sites with the BM Content Builder plugin installed. The ability for low-privileged authenticated users to inject malicious scripts can lead to data breaches involving personal data of EU citizens, potentially violating GDPR regulations. Attackers could leverage this to steal user credentials, perform phishing attacks, or distribute malware, damaging organizational reputation and causing financial loss. Since WordPress is widely used across Europe for corporate websites, e-commerce platforms, and informational portals, the scope of impact is broad. The vulnerability could also be exploited to deface websites or disrupt user trust, which is critical for businesses operating in competitive markets. Additionally, compromised sites might be blacklisted by search engines or security services, further affecting business operations. The medium severity rating suggests that while the vulnerability is not immediately catastrophic, it is sufficiently serious to warrant prompt remediation to prevent escalation or chaining with other vulnerabilities.
Mitigation Recommendations
Organizations should immediately audit their WordPress installations to identify the presence of the BM Content Builder plugin, particularly versions up to 3.16.2.1. Until an official patch is released, administrators should restrict subscriber-level user capabilities or disable the plugin if feasible. Implementing strict user role management and minimizing the number of users with authenticated access can reduce the attack surface. Web Application Firewalls (WAFs) with custom rules to detect and block suspicious script injections targeting the vulnerable function can provide temporary protection. Monitoring logs for unusual page modifications or script injections is also recommended. Once a patch becomes available, prompt application of updates is critical. Additionally, organizations should educate users about the risks of unauthorized script execution and enforce multi-factor authentication to reduce the risk of compromised accounts being used to exploit this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-02-28T11:04:10.400Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6842df031a426642debc956f
Added to database: 6/6/2025, 12:28:51 PM
Last enriched: 7/7/2025, 7:13:32 PM
Last updated: 8/1/2025, 3:11:12 AM
Views: 11
Related Threats
CVE-2025-47206: CWE-787 in QNAP Systems Inc. File Station 5
HighCVE-2025-5296: CWE-59 Improper Link Resolution Before File Access ('Link Following') in Schneider Electric SESU
HighCVE-2025-6625: CWE-20 Improper Input Validation in Schneider Electric Modicon M340
HighCVE-2025-57703: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Delta Electronics DIAEnergie
MediumCVE-2025-57702: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Delta Electronics DIAEnergie
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.