Skip to main content

CVE-2025-3715: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder

Medium
VulnerabilityCVE-2025-3715cvecve-2025-3715cwe-79
Published: Sun May 18 2025 (05/18/2025, 05:22:39 UTC)
Source: CVE
Vendor/Project: boldthemes
Product: Bold Page Builder

Description

The Bold Page Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the data-text parameter in all versions up to, and including, 5.3.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

AI-Powered Analysis

AILast updated: 07/11/2025, 19:49:32 UTC

Technical Analysis

CVE-2025-3715 is a stored Cross-Site Scripting (XSS) vulnerability identified in the Bold Page Builder plugin for WordPress, affecting all versions up to and including 5.3.5. The vulnerability arises due to improper neutralization of input during web page generation, specifically through the 'data-text' parameter. This parameter is insufficiently sanitized and escaped, allowing an authenticated attacker with at least Contributor-level privileges to inject arbitrary malicious scripts into pages. These scripts execute whenever any user accesses the compromised page, potentially leading to session hijacking, credential theft, or unauthorized actions performed on behalf of the user. The vulnerability is classified under CWE-79, which covers improper input validation leading to XSS. The CVSS v3.1 base score is 6.4 (medium severity), reflecting that the attack vector is network-based, requires low attack complexity, and privileges at the contributor level, but does not require user interaction. The scope is changed (S:C), indicating that the vulnerability affects resources beyond the initially vulnerable component, and the impact affects confidentiality and integrity but not availability. No known exploits are currently reported in the wild, and no official patches have been linked yet. The vulnerability was published on May 18, 2025, with the initial reservation on April 16, 2025.

Potential Impact

For European organizations using WordPress sites with the Bold Page Builder plugin, this vulnerability poses a significant risk to the confidentiality and integrity of their web applications. Attackers with contributor-level access—often achievable through compromised accounts or weak internal controls—can inject malicious scripts that execute in the context of users visiting the affected pages. This can lead to theft of session cookies, enabling account takeover, unauthorized data access, or manipulation of site content. Given the widespread use of WordPress in Europe for corporate, governmental, and e-commerce websites, exploitation could result in data breaches, reputational damage, and regulatory non-compliance under GDPR. The vulnerability’s ability to affect multiple users and potentially escalate privileges or pivot to other systems increases its threat level. However, the lack of requirement for user interaction and the need for authenticated access somewhat limits the attack surface, but insider threats or compromised contributor accounts remain a concern.

Mitigation Recommendations

European organizations should immediately audit their WordPress installations to identify the presence of the Bold Page Builder plugin and verify its version. Until an official patch is released, organizations should restrict contributor-level access strictly to trusted users and implement multi-factor authentication to reduce the risk of account compromise. Employing Web Application Firewalls (WAFs) with custom rules to detect and block suspicious payloads targeting the 'data-text' parameter can provide temporary protection. Additionally, security teams should monitor logs for unusual contributor activity and conduct regular security awareness training to prevent credential theft. Organizations should also consider disabling or removing the Bold Page Builder plugin if it is not essential. Once a patch becomes available, prompt application of updates is critical. Implementing Content Security Policy (CSP) headers can further mitigate the impact of XSS by restricting script execution sources.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-04-16T07:51:37.859Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f81484d88663aeb771

Added to database: 5/20/2025, 6:59:04 PM

Last enriched: 7/11/2025, 7:49:32 PM

Last updated: 7/30/2025, 4:07:38 PM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats