Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-69390: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in themebon Business Template Blocks for WPBakery (Visual Composer) Page Builder

0
High
VulnerabilityCVE-2025-69390cvecve-2025-69390
Published: Fri Feb 20 2026 (02/20/2026, 15:46:55 UTC)
Source: CVE Database V5
Vendor/Project: themebon
Product: Business Template Blocks for WPBakery (Visual Composer) Page Builder

Description

CVE-2025-69390 is a reflected Cross-site Scripting (XSS) vulnerability found in the Business Template Blocks for WPBakery (Visual Composer) Page Builder plugin by themebon, affecting versions up to 1. 3. 2. The vulnerability arises from improper neutralization of user input during web page generation, allowing attackers to inject malicious scripts that execute in the context of the victim's browser. Exploitation requires a crafted URL or input that triggers the reflected XSS, potentially enabling session hijacking, credential theft, or redirection to malicious sites. No known exploits are currently reported in the wild, and no official patches have been linked yet. Organizations using this plugin on WordPress sites are at risk, especially if they allow untrusted user input to be reflected in pages without proper sanitization. Mitigation involves applying patches once available, implementing web application firewalls with XSS protections, and restricting user input where possible. Countries with significant WordPress usage and a high prevalence of this plugin, including the United States, Germany, United Kingdom, Australia, Canada, and India, are most likely to be affected. Given the ease of exploitation and potential impact on confidentiality and integrity, the severity is assessed as high.

AI-Powered Analysis

AILast updated: 02/20/2026, 21:45:40 UTC

Technical Analysis

CVE-2025-69390 is a reflected Cross-site Scripting (XSS) vulnerability affecting the Business Template Blocks for WPBakery (Visual Composer) Page Builder plugin developed by themebon. This plugin is used to enhance WordPress websites by providing business-oriented template blocks. The vulnerability stems from improper neutralization of user-supplied input during the generation of web pages, allowing malicious scripts to be injected and executed in the browsers of users who visit a crafted URL or page. Reflected XSS typically requires an attacker to lure victims into clicking a specially crafted link that contains malicious payloads. Once executed, the attacker can hijack user sessions, steal cookies, perform actions on behalf of the user, or redirect users to malicious sites. The affected versions include all releases up to and including 1.3.2. No CVSS score has been assigned yet, and no public exploits have been observed. The vulnerability is significant because WPBakery is a widely used page builder plugin, and the Business Template Blocks add-on is popular among business websites. The lack of input sanitization or encoding during page generation is the root cause, making it possible for attackers to inject arbitrary JavaScript code. This vulnerability can affect any WordPress site using the vulnerable plugin version, especially those with high user interaction or administrative access. The issue was reserved at the end of 2025 and published in early 2026, indicating recent discovery and disclosure.

Potential Impact

The impact of CVE-2025-69390 can be substantial for organizations using the affected plugin. Successful exploitation allows attackers to execute arbitrary JavaScript in the context of the victim's browser, potentially leading to session hijacking, credential theft, unauthorized actions, or distribution of malware. This undermines the confidentiality and integrity of user data and can damage the reputation and trustworthiness of affected websites. For e-commerce and business websites, such attacks can result in financial losses and regulatory compliance issues. Additionally, attackers might leverage the vulnerability to pivot into more extensive attacks against the hosting infrastructure or users. Since the vulnerability is reflected XSS, it requires user interaction but no authentication, increasing the attack surface. Organizations with high traffic websites or those handling sensitive user data are particularly at risk. The absence of public exploits currently reduces immediate risk but does not eliminate the potential for future exploitation. Overall, the vulnerability threatens the availability of secure and trustworthy web services and can lead to significant operational and reputational damage.

Mitigation Recommendations

To mitigate CVE-2025-69390, organizations should first check for updates or patches from themebon and apply them immediately once available. In the absence of official patches, administrators can implement Web Application Firewall (WAF) rules to detect and block malicious input patterns targeting the vulnerable plugin. Input validation and output encoding should be enforced at the application level to neutralize potentially harmful scripts. Site owners should review and restrict the use of untrusted or user-generated content in template blocks. Employing Content Security Policy (CSP) headers can help limit the execution of unauthorized scripts. Regular security audits and penetration testing focused on XSS vulnerabilities are recommended. Additionally, educating users and administrators about the risks of clicking suspicious links can reduce successful exploitation. Monitoring web traffic for unusual patterns and enabling logging for security events related to the plugin can aid in early detection. Finally, consider isolating or disabling the Business Template Blocks add-on if it is not essential, reducing the attack surface.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-12-31T20:13:11.108Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6998c9fbbe58cf853bab8d7d

Added to database: 2/20/2026, 8:54:19 PM

Last enriched: 2/20/2026, 9:45:40 PM

Last updated: 2/21/2026, 2:16:23 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats