The Page Builder: Pagelayer – Drag and Drop website builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via custom attributes in all versions up to, and including, 1.8.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
References
Configurations
History
14 Feb 2025, 17:28
Type | Values Removed | Values Added |
---|---|---|
First Time |
Pagelayer pagelayer
Pagelayer |
|
CWE | CWE-79 | |
CPE | cpe:2.3:a:pagelayer:pagelayer:*:*:*:*:*:wordpress:*:* | |
References | () https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3045444%40pagelayer&new=3045444%40pagelayer&sfp_email=&sfph_mail= - Patch | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/98bff131-dee2-4549-9167-69dc3f8d6b9d?source=cve - Third Party Advisory |
Information
Published : 2024-03-07 20:15
Updated : 2025-02-14 17:28
NVD link : CVE-2024-2127
Mitre link : CVE-2024-2127
CVE.ORG link : CVE-2024-2127
JSON object : View
Products Affected
pagelayer
- pagelayer
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')