Description
The Colibri Page Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'colibri_loop' shortcode in all versions up to, and including, 1.0.335 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: 2025-12-13
Score: 6.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored XSS
Action: Immediate Patch
AI Analysis

Impact

The Colibri Page Builder plugin contains a stored cross‑site scripting flaw in the "colibri_loop" shortcode, caused by insufficient input sanitization and output escaping of user‑supplied attributes. Attackers who can authenticate to the WordPress site with contributor‑level or higher privileges can embed arbitrary JavaScript that is persisted in the page content. When a visitor loads the affected page, the script executes in their browser, potentially allowing defacement, cookie theft, or phishing. This vulnerability directly enables an attacker to inject malicious code that runs with the authority of the viewing user, compromising confidentiality and integrity on the site.

Affected Systems

ExtendThemes’ Colibri Page Builder plugin is affected. All WordPress sites running any version up to and including 1.0.335 are vulnerable. The issue exists regardless of theme or other plugins, as the flaw is confined to the shortcode handling within Colibri Page Builder.

Risk and Exploitability

The CVSS score of 6.4 indicates a medium‑severity issue, while the EPSS score of less than 1% suggests a low probability of exploitation at this time. The vulnerability is not listed in the CISA KEV catalog, indicating no known large‑scale exploitation. Exploitation requires an authenticated user with at least contributor access, which most content editors have. The stored nature of the flaw means that once the malicious code is injected, it remains effective for all visitors, so an attacker can compromise the site’s visitors even after the initial injection. Given the combination of moderate severity and low exploitation likelihood, timely patching is recommended to mitigate potential future exploitation.

Generated by OpenCVE AI on April 22, 2026 at 12:14 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Colibri Page Builder to version 1.0.336 or later from ExtendThemes to remove the vulnerability.
  • If an update is not possible, temporarily deactivate or uninstall the plugin so the vulnerable shortcode cannot be used.
  • Review and restrict contributor access on the WordPress site, ensuring that only trusted users have publishing rights that could exploit the shortcode.
  • Consider implementing a Web Application Firewall or security plugin that detects and blocks injected JavaScript.

Generated by OpenCVE AI on April 22, 2026 at 12:14 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 15 Dec 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sun, 14 Dec 2025 21:30:00 +0000

Type Values Removed Values Added
First Time appeared Extendthemes
Extendthemes colibri Page Builder
Wordpress
Wordpress wordpress
Vendors & Products Extendthemes
Extendthemes colibri Page Builder
Wordpress
Wordpress wordpress

Sat, 13 Dec 2025 04:45:00 +0000

Type Values Removed Values Added
Description The Colibri Page Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'colibri_loop' shortcode in all versions up to, and including, 1.0.335 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Title Colibri Page Builder <= 1.0.335 - Authenticated (Contributor+) Stored Cross-Site Scripting
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Extendthemes Colibri Page Builder
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:46:38.530Z

Reserved: 2025-10-06T15:39:21.973Z

Link: CVE-2025-11376

cve-icon Vulnrichment

Updated: 2025-12-15T15:43:39.199Z

cve-icon NVD

Status : Deferred

Published: 2025-12-13T16:16:45.293

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-11376

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T12:15:16Z

Weaknesses