Show filters
202 Total Results
Displaying 181-190 of 202
Sort by:
Attacker Value
Unknown
CVE-2021-38344
Disclosure Date: October 13, 2021 (last updated February 23, 2025)
The Brizy Page Builder plugin <= 2.3.11 for WordPress was vulnerable to stored XSS by lower-privileged users such as a subscribers. It was possible to add malicious JavaScript to a page by modifying the request sent to update the page via the brizy_update_item AJAX action and adding JavaScript to the data parameter, which would be executed in the session of any visitor viewing or previewing the post or page.
0
Attacker Value
Unknown
CVE-2021-24579
Disclosure Date: August 30, 2021 (last updated February 23, 2025)
The bt_bb_get_grid AJAX action of the Bold Page Builder WordPress plugin before 3.1.6 passes user input into the unserialize() function without any validation or sanitisation, which could lead to a PHP Object Injection. Even though the plugin did not contain a suitable gadget to fully exploit the issue, other installed plugins on the blog could allow such issue to be exploited and lead to RCE in some cases.
0
Attacker Value
Unknown
CVE-2021-24243
Disclosure Date: May 06, 2021 (last updated February 22, 2025)
An AJAX action registered by the WPBakery Page Builder (Visual Composer) Clipboard WordPress plugin before 4.5.6 did not have capability checks nor sanitization, allowing low privilege users (subscriber+) to call it and set XSS payloads, which will be triggered in all backend pages.
0
Attacker Value
Unknown
CVE-2021-24244
Disclosure Date: May 06, 2021 (last updated February 22, 2025)
An AJAX action registered by the WPBakery Page Builder (Visual Composer) Clipboard WordPress plugin before 4.5.8 did not have capability checks, allowing low privilege users, such as subscribers, to update the license options (key, email).
0
Attacker Value
Unknown
CVE-2021-24266
Disclosure Date: May 05, 2021 (last updated February 22, 2025)
The “The Plus Addons for Elementor Page Builder Lite” WordPress Plugin before 2.0.6 has four widgets that are vulnerable to stored Cross-Site Scripting (XSS) by lower-privileged users such as contributors, all via a similar method.
0
Attacker Value
Unknown
CVE-2021-24207
Disclosure Date: April 05, 2021 (last updated February 22, 2025)
By default, the WP Page Builder WordPress plugin before 1.2.4 allows subscriber-level users to edit and make changes to any and all posts pages - user roles must be specifically blocked from editing posts and pages.
0
Attacker Value
Unknown
CVE-2021-24208
Disclosure Date: April 05, 2021 (last updated February 22, 2025)
The editor of the WP Page Builder WordPress plugin before 1.2.4 allows lower-privileged users to insert unfiltered HTML, including JavaScript, into pages via the “Raw HTML” widget and the “Custom HTML” widgets (though the custom HTML widget requires sending a crafted request - it appears that this widget uses some form of client side validation but not server side validation), all of which are added via the “page_builder_data” parameter when performing the “wppb_page_save” AJAX action. It is also possible to insert malicious JavaScript via the “wppb_page_css” parameter (this can be done by closing out the style tag and opening a script tag) when performing the “wppb_page_save” AJAX action.
0
Attacker Value
Unknown
CVE-2020-28650
Disclosure Date: November 16, 2020 (last updated February 22, 2025)
The WPBakery plugin before 6.4.1 for WordPress allows XSS because it calls kses_remove_filters to disable the standard WordPress XSS protection mechanism for the Author and Contributor roles.
0
Attacker Value
Unknown
CVE-2020-20406
Disclosure Date: September 16, 2020 (last updated February 22, 2025)
A stored XSS vulnerability exists in the Custom Link Attributes control Affect function in Elementor Page Builder 2.9.2 and earlier versions. It is caused by inadequate filtering on the link custom attributes.
0
Attacker Value
Unknown
CVE-2020-13865
Disclosure Date: June 05, 2020 (last updated February 21, 2025)
The Elementor Page Builder plugin before 2.9.9 for WordPress suffers from multiple stored XSS vulnerabilities. An author user can create posts that result in stored XSS vulnerabilities, by using a crafted link in the custom URL or by applying custom attributes.
0