Description
The Bold Page Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's bt_bb_raw_content shortcode in all versions up to, and including, 5.4.8 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: 2026-02-07
Score: 6.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting that allows a contributor‑level user to inject arbitrary scripts into pages for all site visitors
Action: Update Plugin
AI Analysis

Impact

The vulnerability resides in the bt_bb_raw_content shortcode of the Bold Page Builder plugin, which fails to sanitize and escape user supplied attributes. An authenticated user with contributor or higher privileges can embed arbitrary JavaScript within the shortcode, causing the code to be stored in the page content. When any visitor loads the page, the injected script will execute in their browser, potentially permitting credential theft, session hijacking, or defacement.

Affected Systems

Boldthemes’ Bold Page Builder WordPress plugin, all releases up to and including version 5.4.8, are affected. Users who have installed these versions and allow contributors to edit pages that use the bt_bb_raw_content shortcode are at risk.

Risk and Exploitability

The CVSS score of 6.4 indicates a moderate-severity flaw. Its EPSS score of less than 1% suggests that exploitation is unlikely in the short term. The vulnerability is not listed in the CISA KEV catalog. Attackers must be authenticated as contributors or higher; they can inject the payload by creating or editing a page that contains the raw_content shortcode. No additional conditions beyond normal WordPress editing permissions are required.

Generated by OpenCVE AI on April 21, 2026 at 00:17 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Bold Page Builder to the latest version (5.4.9 or later) where input sanitization for the bt_bb_raw_content shortcode is properly implemented.
  • If an upgrade cannot be performed immediately, restrict contributor-level users from editing pages that include the raw_content shortcode or remove the shortcode from those pages.
  • Configure web application firewall rules to block or sanitize JavaScript payloads submitted through the bt_bb_raw_content shortcode field.

Generated by OpenCVE AI on April 21, 2026 at 00:17 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 09 Feb 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 09 Feb 2026 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Bold-themes
Bold-themes bold Page Builder
Wordpress
Wordpress wordpress
Vendors & Products Bold-themes
Bold-themes bold Page Builder
Wordpress
Wordpress wordpress

Sat, 07 Feb 2026 06:00:00 +0000

Type Values Removed Values Added
Description The Bold Page Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's bt_bb_raw_content shortcode in all versions up to, and including, 5.4.8 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Title Bold Page Builder <= 5.4.8 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Bold-themes Bold Page Builder
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:33:10.487Z

Reserved: 2025-10-24T13:23:22.116Z

Link: CVE-2025-12159

cve-icon Vulnrichment

Updated: 2026-02-09T15:19:06.916Z

cve-icon NVD

Status : Deferred

Published: 2026-02-07T06:16:02.457

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-12159

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T00:30:22Z

Weaknesses