CVE-2025-48088: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Brainstorm Force Ultimate Addons for WPBakery Page Builder
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Brainstorm Force Ultimate Addons for WPBakery Page Builder allows Stored XSS.This issue affects Ultimate Addons for WPBakery Page Builder: from n/a before 3.21.1.
AI Analysis
Technical Summary
CVE-2025-48088 is a stored cross-site scripting (XSS) vulnerability classified under CWE-79, found in the Ultimate Addons for WPBakery Page Builder plugin developed by Brainstorm Force. This vulnerability results from improper neutralization of input during web page generation, allowing malicious scripts to be stored and later executed in the context of users visiting the affected WordPress site. The flaw affects all versions prior to 3.21.1, though the exact affected versions are not explicitly listed. The vulnerability requires an attacker to have at least low-level privileges (PR:L) and user interaction (UI:R) to exploit, such as submitting crafted input that is later rendered without proper sanitization. The CVSS 3.1 base score is 6.5, indicating a medium severity level, with the vector AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L, meaning the attack can be performed remotely over the network with low attack complexity, requires privileges and user interaction, and impacts confidentiality, integrity, and availability to a limited extent. Stored XSS can enable attackers to execute arbitrary JavaScript in the victim’s browser, potentially leading to session hijacking, defacement, or further exploitation. No public exploits or active exploitation in the wild have been reported yet. The vulnerability is significant for websites using this plugin, especially those with multiple users or administrators, as it can be leveraged to escalate privileges or compromise user accounts. The plugin is widely used in WordPress environments, which are prevalent across many European organizations for content management and e-commerce.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to websites using the Ultimate Addons for WPBakery Page Builder plugin. Exploitation could lead to unauthorized script execution, enabling attackers to steal session cookies, deface websites, or perform actions on behalf of legitimate users. This can result in reputational damage, data leakage, and potential compliance issues under GDPR if personal data is compromised. The requirement for authenticated access and user interaction limits the attack surface but does not eliminate risk, especially in environments with many users or contributors. Organizations with public-facing WordPress sites that rely on this plugin for enhanced page building features are particularly vulnerable. The impact extends to availability if attackers use the XSS to inject disruptive scripts. Given the widespread use of WordPress in Europe, the vulnerability could affect a significant number of sites, especially those that delay patching or lack robust input validation and security controls.
Mitigation Recommendations
Organizations should prioritize updating the Ultimate Addons for WPBakery Page Builder plugin to version 3.21.1 or later once the patch is released. Until then, restrict plugin access to trusted users only and limit the ability to input or edit content that could be malicious. Implement strict input validation and output encoding on all user-supplied data within the WordPress environment. Deploy web application firewalls (WAFs) with specific rules to detect and block XSS payloads targeting this plugin. Conduct regular security audits and penetration testing focused on WordPress plugins and user input handling. Educate content editors and administrators about the risks of XSS and safe content management practices. Monitor logs for suspicious activity indicative of attempted exploitation. Consider disabling or replacing the plugin if immediate patching is not feasible. Finally, ensure that WordPress core and all plugins are kept up to date as part of a comprehensive vulnerability management program.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-48088: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Brainstorm Force Ultimate Addons for WPBakery Page Builder
Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Brainstorm Force Ultimate Addons for WPBakery Page Builder allows Stored XSS.This issue affects Ultimate Addons for WPBakery Page Builder: from n/a before 3.21.1.
AI-Powered Analysis
Technical Analysis
CVE-2025-48088 is a stored cross-site scripting (XSS) vulnerability classified under CWE-79, found in the Ultimate Addons for WPBakery Page Builder plugin developed by Brainstorm Force. This vulnerability results from improper neutralization of input during web page generation, allowing malicious scripts to be stored and later executed in the context of users visiting the affected WordPress site. The flaw affects all versions prior to 3.21.1, though the exact affected versions are not explicitly listed. The vulnerability requires an attacker to have at least low-level privileges (PR:L) and user interaction (UI:R) to exploit, such as submitting crafted input that is later rendered without proper sanitization. The CVSS 3.1 base score is 6.5, indicating a medium severity level, with the vector AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L, meaning the attack can be performed remotely over the network with low attack complexity, requires privileges and user interaction, and impacts confidentiality, integrity, and availability to a limited extent. Stored XSS can enable attackers to execute arbitrary JavaScript in the victim’s browser, potentially leading to session hijacking, defacement, or further exploitation. No public exploits or active exploitation in the wild have been reported yet. The vulnerability is significant for websites using this plugin, especially those with multiple users or administrators, as it can be leveraged to escalate privileges or compromise user accounts. The plugin is widely used in WordPress environments, which are prevalent across many European organizations for content management and e-commerce.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to websites using the Ultimate Addons for WPBakery Page Builder plugin. Exploitation could lead to unauthorized script execution, enabling attackers to steal session cookies, deface websites, or perform actions on behalf of legitimate users. This can result in reputational damage, data leakage, and potential compliance issues under GDPR if personal data is compromised. The requirement for authenticated access and user interaction limits the attack surface but does not eliminate risk, especially in environments with many users or contributors. Organizations with public-facing WordPress sites that rely on this plugin for enhanced page building features are particularly vulnerable. The impact extends to availability if attackers use the XSS to inject disruptive scripts. Given the widespread use of WordPress in Europe, the vulnerability could affect a significant number of sites, especially those that delay patching or lack robust input validation and security controls.
Mitigation Recommendations
Organizations should prioritize updating the Ultimate Addons for WPBakery Page Builder plugin to version 3.21.1 or later once the patch is released. Until then, restrict plugin access to trusted users only and limit the ability to input or edit content that could be malicious. Implement strict input validation and output encoding on all user-supplied data within the WordPress environment. Deploy web application firewalls (WAFs) with specific rules to detect and block XSS payloads targeting this plugin. Conduct regular security audits and penetration testing focused on WordPress plugins and user input handling. Educate content editors and administrators about the risks of XSS and safe content management practices. Monitor logs for suspicious activity indicative of attempted exploitation. Consider disabling or replacing the plugin if immediate patching is not feasible. Finally, ensure that WordPress core and all plugins are kept up to date as part of a comprehensive vulnerability management program.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-05-15T17:54:23.204Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68fedab123a7bbed324d60d6
Added to database: 10/27/2025, 2:36:33 AM
Last enriched: 1/20/2026, 7:51:49 PM
Last updated: 2/6/2026, 10:01:05 AM
Views: 180
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2013: SQL Injection in itsourcecode Student Management System
MediumCVE-2026-24928: CWE-680 Integer Overflow to Buffer Overflow in Huawei HarmonyOS
MediumCVE-2026-24927: CWE-416 Use After Free in Huawei HarmonyOS
MediumCVE-2026-24924: CWE-264 Permissions, Privileges, and Access Controls in Huawei HarmonyOS
MediumCVE-2026-24920: CWE-264 Permissions, Privileges, and Access Controls in Huawei HarmonyOS
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.