Impact
The Live Composer plugin contains several DOM‑based stored cross‑site scripting flaws caused by insufficient sanitization of user‑supplied attributes. Authenticated contributors or higher can embed arbitrary JavaScript into page elements. When any visitor loads the affected page, the injected script runs in their browser, enabling attackers to steal session tokens, deface content, or phish for credentials. The vulnerability does not grant direct code execution on the server, but it provides a powerful client‑side attack surface useful for credential theft and further exploitation.
Affected Systems
All installations of the Live Composer – Free WordPress Website Builder plugin up to and including version 2.0.2 are affected. Users running any earlier or later versions are not impacted by this flaw.
Risk and Exploitability
With a CVSS score of 6.4, the vulnerability is considered moderate severity. The EPSS score, currently less than 1%, indicates a low probability of exploitation, and the flaw is not listed in the CISA KEV catalog. Authentication is required: an attacker must have contributor-level access or higher to inject the malicious script. The stored nature of the payload means the impact depends on who views the page, making the risk significant for sites with many visitors but limited to those who accrue contributor privileges.
OpenCVE Enrichment