Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-48088: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Brainstorm Force Ultimate Addons for WPBakery Page Builder

0
Medium
VulnerabilityCVE-2025-48088cvecve-2025-48088cwe-79
Published: Mon Oct 27 2025 (10/27/2025, 02:09:52 UTC)
Source: CVE Database V5
Vendor/Project: Brainstorm Force
Product: Ultimate Addons for WPBakery Page Builder

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Brainstorm Force Ultimate Addons for WPBakery Page Builder allows Stored XSS.This issue affects Ultimate Addons for WPBakery Page Builder: from n/a before 3.21.1.

AI-Powered Analysis

AILast updated: 01/20/2026, 19:51:49 UTC

Technical Analysis

CVE-2025-48088 is a stored cross-site scripting (XSS) vulnerability classified under CWE-79, found in the Ultimate Addons for WPBakery Page Builder plugin developed by Brainstorm Force. This vulnerability results from improper neutralization of input during web page generation, allowing malicious scripts to be stored and later executed in the context of users visiting the affected WordPress site. The flaw affects all versions prior to 3.21.1, though the exact affected versions are not explicitly listed. The vulnerability requires an attacker to have at least low-level privileges (PR:L) and user interaction (UI:R) to exploit, such as submitting crafted input that is later rendered without proper sanitization. The CVSS 3.1 base score is 6.5, indicating a medium severity level, with the vector AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L, meaning the attack can be performed remotely over the network with low attack complexity, requires privileges and user interaction, and impacts confidentiality, integrity, and availability to a limited extent. Stored XSS can enable attackers to execute arbitrary JavaScript in the victim’s browser, potentially leading to session hijacking, defacement, or further exploitation. No public exploits or active exploitation in the wild have been reported yet. The vulnerability is significant for websites using this plugin, especially those with multiple users or administrators, as it can be leveraged to escalate privileges or compromise user accounts. The plugin is widely used in WordPress environments, which are prevalent across many European organizations for content management and e-commerce.

Potential Impact

For European organizations, this vulnerability poses a moderate risk primarily to websites using the Ultimate Addons for WPBakery Page Builder plugin. Exploitation could lead to unauthorized script execution, enabling attackers to steal session cookies, deface websites, or perform actions on behalf of legitimate users. This can result in reputational damage, data leakage, and potential compliance issues under GDPR if personal data is compromised. The requirement for authenticated access and user interaction limits the attack surface but does not eliminate risk, especially in environments with many users or contributors. Organizations with public-facing WordPress sites that rely on this plugin for enhanced page building features are particularly vulnerable. The impact extends to availability if attackers use the XSS to inject disruptive scripts. Given the widespread use of WordPress in Europe, the vulnerability could affect a significant number of sites, especially those that delay patching or lack robust input validation and security controls.

Mitigation Recommendations

Organizations should prioritize updating the Ultimate Addons for WPBakery Page Builder plugin to version 3.21.1 or later once the patch is released. Until then, restrict plugin access to trusted users only and limit the ability to input or edit content that could be malicious. Implement strict input validation and output encoding on all user-supplied data within the WordPress environment. Deploy web application firewalls (WAFs) with specific rules to detect and block XSS payloads targeting this plugin. Conduct regular security audits and penetration testing focused on WordPress plugins and user input handling. Educate content editors and administrators about the risks of XSS and safe content management practices. Monitor logs for suspicious activity indicative of attempted exploitation. Consider disabling or replacing the plugin if immediate patching is not feasible. Finally, ensure that WordPress core and all plugins are kept up to date as part of a comprehensive vulnerability management program.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-05-15T17:54:23.204Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68fedab123a7bbed324d60d6

Added to database: 10/27/2025, 2:36:33 AM

Last enriched: 1/20/2026, 7:51:49 PM

Last updated: 2/6/2026, 10:01:05 AM

Views: 180

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats