CVE-2025-4223: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in softaculous Page Builder: Pagelayer – Drag and Drop website builder
The Page Builder: Pagelayer – Drag and Drop website builder plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘login_url’ parameter in all versions up to, and including, 2.0.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. A valid username/password pair needs to be supplied in order to be successfully exploited and any injected scripts will only execute in the context of that authenticated user.
AI Analysis
Technical Summary
CVE-2025-4223 is a reflected Cross-Site Scripting (XSS) vulnerability identified in the Page Builder: Pagelayer – Drag and Drop website builder plugin for WordPress, affecting all versions up to and including 2.0.0. The vulnerability stems from improper neutralization of input during web page generation, specifically inadequate sanitization and escaping of the 'login_url' parameter. This flaw allows an unauthenticated attacker to craft malicious URLs containing arbitrary JavaScript code. When an authenticated user with valid credentials clicks such a URL, the injected script executes within the security context of that user’s browser session. This can lead to theft of sensitive information, session hijacking, or unauthorized actions performed on behalf of the user. The attack requires user interaction (clicking a malicious link) and valid authentication credentials, limiting the attack surface but still posing a significant risk. The vulnerability has a CVSS v3.1 base score of 4.7, categorized as medium severity, with attack vector network, high attack complexity, no privileges required, user interaction required, and partial impact on confidentiality and integrity but no impact on availability. No patches or exploits in the wild are currently reported, but the plugin’s widespread use in WordPress sites makes it a notable threat. The vulnerability is tracked under CWE-79 (Improper Neutralization of Input During Web Page Generation).
Potential Impact
The primary impact of CVE-2025-4223 is on the confidentiality and integrity of authenticated users’ sessions on websites using the vulnerable Page Builder plugin. Successful exploitation can lead to theft of session cookies, user credentials, or other sensitive data accessible in the browser context. Attackers could also perform unauthorized actions on behalf of the user, such as changing site content or settings, depending on the user’s privileges. Although availability is not affected, the breach of user trust and potential data leakage can have reputational and operational consequences for organizations. Since exploitation requires valid credentials and user interaction, the risk is somewhat mitigated but remains significant for sites with many users or high-value accounts. Organizations running WordPress sites with this plugin, especially those handling sensitive user data or financial transactions, face increased risk of targeted phishing campaigns leveraging this vulnerability. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate the potential for future attacks.
Mitigation Recommendations
1. Update the Page Builder: Pagelayer plugin to the latest version once a patch is released by the vendor to ensure proper input sanitization and output escaping. 2. In the interim, disable or restrict access to the vulnerable plugin functionality, especially the handling of the 'login_url' parameter. 3. Implement Web Application Firewall (WAF) rules to detect and block suspicious requests containing malicious scripts targeting the 'login_url' parameter. 4. Enforce Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. 5. Educate users and administrators about phishing risks and the dangers of clicking untrusted links, particularly those purporting to be login URLs. 6. Monitor web server and application logs for unusual URL parameters or repeated failed login attempts that may indicate exploitation attempts. 7. Employ multi-factor authentication (MFA) to reduce the impact of compromised credentials. 8. Conduct regular security audits and vulnerability scans on WordPress plugins to identify and remediate similar issues proactively.
Affected Countries
United States, India, United Kingdom, Germany, Canada, Australia, Brazil, France, Japan, Netherlands, Italy, Spain
CVE-2025-4223: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in softaculous Page Builder: Pagelayer – Drag and Drop website builder
Description
The Page Builder: Pagelayer – Drag and Drop website builder plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘login_url’ parameter in all versions up to, and including, 2.0.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. A valid username/password pair needs to be supplied in order to be successfully exploited and any injected scripts will only execute in the context of that authenticated user.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-4223 is a reflected Cross-Site Scripting (XSS) vulnerability identified in the Page Builder: Pagelayer – Drag and Drop website builder plugin for WordPress, affecting all versions up to and including 2.0.0. The vulnerability stems from improper neutralization of input during web page generation, specifically inadequate sanitization and escaping of the 'login_url' parameter. This flaw allows an unauthenticated attacker to craft malicious URLs containing arbitrary JavaScript code. When an authenticated user with valid credentials clicks such a URL, the injected script executes within the security context of that user’s browser session. This can lead to theft of sensitive information, session hijacking, or unauthorized actions performed on behalf of the user. The attack requires user interaction (clicking a malicious link) and valid authentication credentials, limiting the attack surface but still posing a significant risk. The vulnerability has a CVSS v3.1 base score of 4.7, categorized as medium severity, with attack vector network, high attack complexity, no privileges required, user interaction required, and partial impact on confidentiality and integrity but no impact on availability. No patches or exploits in the wild are currently reported, but the plugin’s widespread use in WordPress sites makes it a notable threat. The vulnerability is tracked under CWE-79 (Improper Neutralization of Input During Web Page Generation).
Potential Impact
The primary impact of CVE-2025-4223 is on the confidentiality and integrity of authenticated users’ sessions on websites using the vulnerable Page Builder plugin. Successful exploitation can lead to theft of session cookies, user credentials, or other sensitive data accessible in the browser context. Attackers could also perform unauthorized actions on behalf of the user, such as changing site content or settings, depending on the user’s privileges. Although availability is not affected, the breach of user trust and potential data leakage can have reputational and operational consequences for organizations. Since exploitation requires valid credentials and user interaction, the risk is somewhat mitigated but remains significant for sites with many users or high-value accounts. Organizations running WordPress sites with this plugin, especially those handling sensitive user data or financial transactions, face increased risk of targeted phishing campaigns leveraging this vulnerability. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate the potential for future attacks.
Mitigation Recommendations
1. Update the Page Builder: Pagelayer plugin to the latest version once a patch is released by the vendor to ensure proper input sanitization and output escaping. 2. In the interim, disable or restrict access to the vulnerable plugin functionality, especially the handling of the 'login_url' parameter. 3. Implement Web Application Firewall (WAF) rules to detect and block suspicious requests containing malicious scripts targeting the 'login_url' parameter. 4. Enforce Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. 5. Educate users and administrators about phishing risks and the dangers of clicking untrusted links, particularly those purporting to be login URLs. 6. Monitor web server and application logs for unusual URL parameters or repeated failed login attempts that may indicate exploitation attempts. 7. Employ multi-factor authentication (MFA) to reduce the impact of compromised credentials. 8. Conduct regular security audits and vulnerability scans on WordPress plugins to identify and remediate similar issues proactively.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-05-02T13:27:27.597Z
- Cisa Enriched
- false
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68314cf70acd01a249279f7b
Added to database: 5/24/2025, 4:37:11 AM
Last enriched: 2/27/2026, 2:24:26 PM
Last updated: 3/24/2026, 1:00:57 PM
Views: 66
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.