Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-34889: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Brainstorm Force Ultimate Addons for WPBakery Page Builder

0
Medium
VulnerabilityCVE-2026-34889cvecve-2026-34889cwe-79
Published: Wed Apr 01 2026 (04/01/2026, 08:51:32 UTC)
Source: CVE Database V5
Vendor/Project: Brainstorm Force
Product: Ultimate Addons for WPBakery Page Builder

Description

CVE-2026-34889 is a DOM-based Cross-site Scripting (XSS) vulnerability in the Ultimate Addons for WPBakery Page Builder plugin by Brainstorm Force. This vulnerability arises from improper neutralization of input during web page generation, allowing attackers to inject malicious scripts into web pages. It affects versions prior to 3. 21. 4 and requires low privileges and user interaction to exploit. The vulnerability can lead to partial compromise of confidentiality, integrity, and availability of affected websites. No known exploits are currently reported in the wild. The CVSS score is 6. 5, indicating a medium severity level. Organizations using this plugin should prioritize updating to the latest version once available and implement additional input validation and content security policies to mitigate risks.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/01/2026, 09:23:25 UTC

Technical Analysis

CVE-2026-34889 is a security vulnerability classified under CWE-79, indicating improper neutralization of input leading to Cross-site Scripting (XSS). Specifically, it is a DOM-based XSS vulnerability found in the Ultimate Addons for WPBakery Page Builder plugin developed by Brainstorm Force. This plugin extends the functionality of the popular WPBakery Page Builder used in WordPress websites. The vulnerability allows an attacker to inject malicious scripts into the Document Object Model (DOM) of a web page by exploiting insufficient sanitization of user-supplied input during page generation. The affected versions are those before 3.21.4, though exact version ranges are not specified. The attack vector is network-based, requiring low attack complexity, but it does require privileges (PR:L) and user interaction (UI:R), meaning the attacker must have some level of access and trick a user into triggering the malicious payload. The vulnerability impacts confidentiality, integrity, and availability to a limited extent, as indicated by the CVSS vector (C:L/I:L/A:L). No public exploits have been reported yet, but the vulnerability is published and should be addressed promptly. The lack of a patch link suggests that a fix may be forthcoming or that users should upgrade to the latest plugin version when available. The vulnerability is significant because WPBakery Page Builder and its addons are widely used in WordPress sites, which are common targets for web-based attacks.

Potential Impact

The primary impact of this vulnerability is the potential for attackers to execute arbitrary JavaScript in the context of affected websites, leading to session hijacking, defacement, redirection to malicious sites, or theft of sensitive user data. This can erode user trust, damage brand reputation, and potentially lead to regulatory penalties if user data is compromised. Since the vulnerability requires user interaction and some privilege level, the risk is somewhat mitigated but still notable, especially for websites with high traffic or sensitive user information. The scope of affected systems is broad given the popularity of WPBakery Page Builder and its addons in WordPress ecosystems worldwide. Organizations relying on this plugin for website content management and presentation are at risk of targeted attacks that exploit this vulnerability to gain footholds or escalate privileges within their web infrastructure.

Mitigation Recommendations

Organizations should immediately verify the version of Ultimate Addons for WPBakery Page Builder in use and upgrade to version 3.21.4 or later once it is officially released and confirmed to contain the fix. Until an official patch is applied, administrators should implement strict input validation and sanitization on all user-supplied data, especially data that is reflected in the DOM. Employing Content Security Policy (CSP) headers can help mitigate the impact of injected scripts by restricting script execution sources. Additionally, monitoring web traffic and logs for unusual activity or attempted XSS payloads can provide early detection of exploitation attempts. Limiting user privileges and educating users about phishing or social engineering tactics that could trigger the vulnerability will further reduce risk. Regular security audits of WordPress plugins and prompt application of security updates are essential best practices to prevent exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2026-03-31T09:57:17.719Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69cce0a2e6bfc5ba1db4f246

Added to database: 4/1/2026, 9:08:50 AM

Last enriched: 4/1/2026, 9:23:25 AM

Last updated: 4/1/2026, 11:51:15 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses