CVE-2025-1777: CWE-862 Missing Authorization in SeaTheme BM Content Builder
The BM Content Builder plugin for WordPress is vulnerable to unauthorized modification of data to a missing capability check on the 'ux_cb_page_options_save' function in all versions up to, and including, 3.16.2.1. This makes it possible for authenticated attackers, with subscriber-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
AI Analysis
Technical Summary
CVE-2025-1777 is a security vulnerability identified in the BM Content Builder plugin developed by SeaTheme for WordPress. This vulnerability stems from a missing authorization check (CWE-862) in the function 'ux_cb_page_options_save' across all versions up to and including 3.16.2.1. Specifically, the plugin fails to properly verify whether an authenticated user has the necessary capabilities before allowing modifications to page options. As a result, any authenticated user with at least subscriber-level access can exploit this flaw to inject arbitrary web scripts into pages. These injected scripts execute whenever any user accesses the compromised page, effectively enabling cross-site scripting (XSS) attacks. The vulnerability has a CVSS 3.1 base score of 6.4, indicating a medium severity level. The attack vector is network-based (remote), requires low attack complexity, and privileges at the level of an authenticated user (PR:L). No user interaction is needed for the exploit to succeed, and the scope is changed, meaning the vulnerability affects components beyond the initially vulnerable plugin, potentially impacting the entire WordPress site. The confidentiality and integrity of the affected systems are at risk due to the ability to inject malicious scripts, which could lead to session hijacking, credential theft, or further compromise of the website and its visitors. Availability impact is not significant. No known exploits are currently reported in the wild, and no patches have been linked yet, emphasizing the need for immediate attention and mitigation by site administrators using this plugin.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially for those relying on WordPress sites with the BM Content Builder plugin installed. The ability for low-privileged authenticated users to inject malicious scripts can lead to data breaches involving personal data of EU citizens, potentially violating GDPR regulations. Attackers could leverage this to steal user credentials, perform phishing attacks, or distribute malware, damaging organizational reputation and causing financial loss. Since WordPress is widely used across Europe for corporate websites, e-commerce platforms, and informational portals, the scope of impact is broad. The vulnerability could also be exploited to deface websites or disrupt user trust, which is critical for businesses operating in competitive markets. Additionally, compromised sites might be blacklisted by search engines or security services, further affecting business operations. The medium severity rating suggests that while the vulnerability is not immediately catastrophic, it is sufficiently serious to warrant prompt remediation to prevent escalation or chaining with other vulnerabilities.
Mitigation Recommendations
Organizations should immediately audit their WordPress installations to identify the presence of the BM Content Builder plugin, particularly versions up to 3.16.2.1. Until an official patch is released, administrators should restrict subscriber-level user capabilities or disable the plugin if feasible. Implementing strict user role management and minimizing the number of users with authenticated access can reduce the attack surface. Web Application Firewalls (WAFs) with custom rules to detect and block suspicious script injections targeting the vulnerable function can provide temporary protection. Monitoring logs for unusual page modifications or script injections is also recommended. Once a patch becomes available, prompt application of updates is critical. Additionally, organizations should educate users about the risks of unauthorized script execution and enforce multi-factor authentication to reduce the risk of compromised accounts being used to exploit this vulnerability.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden
CVE-2025-1777: CWE-862 Missing Authorization in SeaTheme BM Content Builder
Description
The BM Content Builder plugin for WordPress is vulnerable to unauthorized modification of data to a missing capability check on the 'ux_cb_page_options_save' function in all versions up to, and including, 3.16.2.1. This makes it possible for authenticated attackers, with subscriber-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
AI-Powered Analysis
Technical Analysis
CVE-2025-1777 is a security vulnerability identified in the BM Content Builder plugin developed by SeaTheme for WordPress. This vulnerability stems from a missing authorization check (CWE-862) in the function 'ux_cb_page_options_save' across all versions up to and including 3.16.2.1. Specifically, the plugin fails to properly verify whether an authenticated user has the necessary capabilities before allowing modifications to page options. As a result, any authenticated user with at least subscriber-level access can exploit this flaw to inject arbitrary web scripts into pages. These injected scripts execute whenever any user accesses the compromised page, effectively enabling cross-site scripting (XSS) attacks. The vulnerability has a CVSS 3.1 base score of 6.4, indicating a medium severity level. The attack vector is network-based (remote), requires low attack complexity, and privileges at the level of an authenticated user (PR:L). No user interaction is needed for the exploit to succeed, and the scope is changed, meaning the vulnerability affects components beyond the initially vulnerable plugin, potentially impacting the entire WordPress site. The confidentiality and integrity of the affected systems are at risk due to the ability to inject malicious scripts, which could lead to session hijacking, credential theft, or further compromise of the website and its visitors. Availability impact is not significant. No known exploits are currently reported in the wild, and no patches have been linked yet, emphasizing the need for immediate attention and mitigation by site administrators using this plugin.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially for those relying on WordPress sites with the BM Content Builder plugin installed. The ability for low-privileged authenticated users to inject malicious scripts can lead to data breaches involving personal data of EU citizens, potentially violating GDPR regulations. Attackers could leverage this to steal user credentials, perform phishing attacks, or distribute malware, damaging organizational reputation and causing financial loss. Since WordPress is widely used across Europe for corporate websites, e-commerce platforms, and informational portals, the scope of impact is broad. The vulnerability could also be exploited to deface websites or disrupt user trust, which is critical for businesses operating in competitive markets. Additionally, compromised sites might be blacklisted by search engines or security services, further affecting business operations. The medium severity rating suggests that while the vulnerability is not immediately catastrophic, it is sufficiently serious to warrant prompt remediation to prevent escalation or chaining with other vulnerabilities.
Mitigation Recommendations
Organizations should immediately audit their WordPress installations to identify the presence of the BM Content Builder plugin, particularly versions up to 3.16.2.1. Until an official patch is released, administrators should restrict subscriber-level user capabilities or disable the plugin if feasible. Implementing strict user role management and minimizing the number of users with authenticated access can reduce the attack surface. Web Application Firewalls (WAFs) with custom rules to detect and block suspicious script injections targeting the vulnerable function can provide temporary protection. Monitoring logs for unusual page modifications or script injections is also recommended. Once a patch becomes available, prompt application of updates is critical. Additionally, organizations should educate users about the risks of unauthorized script execution and enforce multi-factor authentication to reduce the risk of compromised accounts being used to exploit this vulnerability.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-02-28T11:04:10.400Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6842df031a426642debc956f
Added to database: 6/6/2025, 12:28:51 PM
Last enriched: 7/7/2025, 7:13:32 PM
Last updated: 1/7/2026, 4:19:20 AM
Views: 43
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-20893: Origin validation error in Fujitsu Client Computing Limited Fujitsu Security Solution AuthConductor Client Basic V2
HighCVE-2025-14891: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ivole Customer Reviews for WooCommerce
MediumCVE-2025-14059: CWE-73 External Control of File Name or Path in roxnor EmailKit – Email Customizer for WooCommerce & WP
MediumCVE-2025-12648: CWE-552 Files or Directories Accessible to External Parties in cbutlerjr WP-Members Membership Plugin
MediumCVE-2025-14631: CWE-476 NULL Pointer Dereference in TP-Link Systems Inc. Archer BE400
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.