Skip to main content

CVE-2025-5286: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder

Medium
VulnerabilityCVE-2025-5286cvecve-2025-5286cwe-79
Published: Thu May 29 2025 (05/29/2025, 08:22:03 UTC)
Source: CVE Database V5
Vendor/Project: boldthemes
Product: Bold Page Builder

Description

The Bold Page Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘additional_settings’ parameter in all versions up to, and including, 5.3.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

AI-Powered Analysis

AILast updated: 07/07/2025, 04:43:33 UTC

Technical Analysis

CVE-2025-5286 is a stored Cross-Site Scripting (XSS) vulnerability affecting the Bold Page Builder plugin for WordPress, versions up to and including 5.3.6. The vulnerability arises from improper neutralization of input during web page generation, specifically via the 'additional_settings' parameter. Due to insufficient input sanitization and lack of proper output escaping, authenticated users with Contributor-level access or higher can inject arbitrary malicious scripts into pages. These scripts are stored persistently and executed whenever any user accesses the compromised page. The vulnerability is classified under CWE-79, indicating a failure to properly sanitize input leading to XSS. The CVSS v3.1 base score is 6.4, reflecting a medium severity level. The attack vector is network-based (remote), with low attack complexity and requiring privileges (Contributor or above). No user interaction is needed for exploitation, and the impact affects confidentiality and integrity, but not availability. The vulnerability has a scope change, meaning the impact extends beyond the vulnerable component to other components or users. No known exploits are reported in the wild as of the publication date (May 29, 2025). This vulnerability enables attackers to execute arbitrary JavaScript in the context of the affected site, potentially leading to session hijacking, privilege escalation, defacement, or distribution of malware. Since the exploit requires authenticated access at Contributor level or higher, the threat is limited to environments where such user roles exist and can be compromised or misused. The lack of a patch link indicates that a fix may not yet be publicly available, increasing the urgency for mitigation through other means.

Potential Impact

For European organizations using WordPress sites with the Bold Page Builder plugin, this vulnerability poses a significant risk to the confidentiality and integrity of web applications. Attackers with Contributor-level access can inject malicious scripts that execute in the browsers of site visitors or administrators, potentially leading to theft of session cookies, unauthorized actions on behalf of users, or distribution of malware. This can result in data breaches, reputational damage, and regulatory non-compliance under GDPR due to exposure of personal data. The medium severity score reflects that while availability is not impacted, the ability to compromise user sessions and manipulate content can have serious consequences, especially for organizations handling sensitive information or providing critical services. The vulnerability's exploitation does not require user interaction, increasing the risk of automated or widespread attacks once an attacker gains the necessary privileges. European organizations with multi-user WordPress environments, especially those allowing Contributor or higher roles, are at heightened risk. The absence of known exploits in the wild suggests a window of opportunity for proactive defense before active exploitation occurs.

Mitigation Recommendations

1. Immediately audit user roles and permissions on WordPress sites using Bold Page Builder to ensure that only trusted users have Contributor-level or higher access. Remove or restrict unnecessary elevated privileges. 2. Implement strict input validation and output encoding at the application level for the 'additional_settings' parameter if custom code or filters are used. 3. Monitor and review content changes made by Contributors or Editors for suspicious or unexpected script injections. 4. Employ Web Application Firewalls (WAFs) with rules designed to detect and block stored XSS payloads targeting the Bold Page Builder plugin. 5. Keep WordPress core and all plugins updated; monitor vendor announcements for patches addressing CVE-2025-5286 and apply them promptly once available. 6. Use Content Security Policy (CSP) headers to restrict execution of unauthorized scripts in browsers, mitigating impact of injected scripts. 7. Conduct regular security training for site administrators and content editors to recognize and prevent misuse of privileges. 8. Consider temporarily disabling or replacing the Bold Page Builder plugin if a patch is not yet available and the risk is unacceptable.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-05-27T19:08:59.083Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68381aae182aa0cae273c2cd

Added to database: 5/29/2025, 8:28:30 AM

Last enriched: 7/7/2025, 4:43:33 AM

Last updated: 7/30/2025, 8:37:35 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats