Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62990: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Livemesh Livemesh Addons for Beaver Builder

0
Medium
VulnerabilityCVE-2025-62990cvecve-2025-62990cwe-79
Published: Wed Dec 31 2025 (12/31/2025, 12:57:22 UTC)
Source: CVE Database V5
Vendor/Project: Livemesh
Product: Livemesh Addons for Beaver Builder

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Livemesh Livemesh Addons for Beaver Builder addons-for-beaver-builder allows Stored XSS.This issue affects Livemesh Addons for Beaver Builder: from n/a through 3.9.2.

AI-Powered Analysis

AILast updated: 12/31/2025, 13:28:52 UTC

Technical Analysis

CVE-2025-62990 is a stored Cross-site Scripting (XSS) vulnerability classified under CWE-79, found in Livemesh Addons for Beaver Builder, a popular WordPress plugin suite used to enhance Beaver Builder page functionalities. The vulnerability stems from improper neutralization of user-supplied input during the generation of web pages, allowing malicious scripts to be stored and later executed in the context of other users’ browsers. This can occur when user input is embedded in web pages without adequate sanitization or encoding, enabling attackers to inject JavaScript payloads that execute when other users view the affected pages. The vulnerability affects all versions up to 3.9.2, with no specific version exclusions noted. The CVSS v3.1 base score is 6.5, indicating medium severity, with the vector AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L. This means the attack can be performed remotely over the network, requires low attack complexity, low privileges (authenticated user), and user interaction (victim must trigger the malicious payload). The scope is changed, indicating that exploitation can affect resources beyond the vulnerable component. The impact includes partial loss of confidentiality, integrity, and availability, such as theft of session cookies, defacement, or injection of malicious content leading to further compromise. No patches are currently linked, and no known exploits are reported in the wild, suggesting the vulnerability is newly disclosed or not yet actively exploited. The plugin’s integration in WordPress sites makes it a potential vector for attackers targeting websites that use Beaver Builder with Livemesh Addons, common in business and content-heavy sites.

Potential Impact

For European organizations, the impact of this vulnerability can be significant, especially for those relying on WordPress with Livemesh Addons for Beaver Builder to manage their web presence. Exploitation could lead to unauthorized access to user sessions, defacement of websites, or distribution of malware to site visitors, damaging brand reputation and customer trust. Confidential data leakage through session hijacking or theft of authentication tokens could facilitate further attacks within corporate networks. The partial integrity and availability impacts could disrupt business operations, particularly for e-commerce or service portals. Given the medium severity and requirement for authenticated access, insider threats or compromised user accounts could be leveraged to exploit this vulnerability. Organizations in sectors such as finance, healthcare, and government, which often use WordPress for public-facing sites, may face regulatory and compliance risks under GDPR if personal data is exposed. The lack of known exploits currently provides a window for proactive mitigation before widespread attacks occur.

Mitigation Recommendations

1. Monitor Livemesh and Beaver Builder official channels for security updates and apply patches immediately once released. 2. Restrict plugin usage to trusted users only, minimizing the number of accounts with permissions to input content that is rendered on web pages. 3. Implement strong Content Security Policies (CSP) to limit the execution of unauthorized scripts in browsers. 4. Employ Web Application Firewalls (WAF) with custom rules to detect and block suspicious input patterns indicative of XSS attempts. 5. Conduct regular security audits and code reviews of custom content or extensions interacting with the plugin. 6. Sanitize and encode all user inputs rigorously, especially those that are stored and rendered on pages. 7. Educate site administrators and content creators about the risks of XSS and safe content practices. 8. Use security plugins that can detect and alert on XSS payloads or anomalous behavior. 9. Monitor web server and application logs for unusual activities or repeated input patterns. 10. Consider isolating critical web applications or using sandboxing techniques to limit the impact of potential exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-10-24T14:25:19.440Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69552191db813ff03ee950ee

Added to database: 12/31/2025, 1:13:53 PM

Last enriched: 12/31/2025, 1:28:52 PM

Last updated: 1/8/2026, 6:40:20 AM

Views: 20

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats