Description
The BM Content Builder plugin for WordPress is vulnerable to unauthorized modification of data to a missing capability check on the 'ux_cb_page_options_save' function in all versions up to, and including, 3.16.2.1. This makes it possible for authenticated attackers, with subscriber-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: 2025-06-06
Score: 6.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized modification of data leading to stored cross‑site scripting
Action: Apply Patch
AI Analysis

Impact

The BM Content Builder plugin for WordPress contains a missing capability check in the function that saves page options. Because of this, an authenticated user with subscriber-level or higher access can inject arbitrary JavaScript into any page. When that page is viewed by other users, the injected scripts run in their browsers, enabling the attacker to steal credentials, forge requests, or perform other client‑side malicious actions. The weakness is classified as CWE‑862, representing a missing authorization test.

Affected Systems

SeaTheme’s BM Content Builder plugin, versions up to and including 3.16.2.1, is affected. Systems running any WordPress site that has this plugin installed and has configured subscriber or higher roles are vulnerable.

Risk and Exploitability

The CVSS score of 6.4 indicates a medium severity risk. The EPSS score of less than 1% suggests a very low probability that an exploit is currently being attempted, and the vulnerability is not listed in the CISA KEV catalog. The attack requires an authenticated subscriber or higher; therefore, it is limited to users who already have legitimate access to the site. Nonetheless, because the injected scripts execute on every visitor to the affected page, the impact can reach a large audience once the attack is performed.

Generated by OpenCVE AI on April 20, 2026 at 22:37 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade BM Content Builder to a version newer than 3.16.2.1 where the missing capability check has been added
  • If an upgrade is not immediately possible, remove the plugin or disable the page options saving feature for subscribers and lower roles
  • Apply strong role‑based permissions so that only trusted administrators can edit page options, and audit user accounts for unnecessary high‑level privileges

Generated by OpenCVE AI on April 20, 2026 at 22:37 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-17053 The BM Content Builder plugin for WordPress is vulnerable to unauthorized modification of data to a missing capability check on the 'ux_cb_page_options_save' function in all versions up to, and including, 3.16.2.1. This makes it possible for authenticated attackers, with subscriber-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
History

Fri, 06 Jun 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 06 Jun 2025 05:30:00 +0000

Type Values Removed Values Added
Description The BM Content Builder plugin for WordPress is vulnerable to unauthorized modification of data to a missing capability check on the 'ux_cb_page_options_save' function in all versions up to, and including, 3.16.2.1. This makes it possible for authenticated attackers, with subscriber-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Title BM Content Builder <= 3.16.2.1 - Missing Authorization to Authenticated (Subscriber+) Stored Cross-Site Scripting via ux_cb_page_options_save
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:34:31.448Z

Reserved: 2025-02-28T11:04:10.400Z

Link: CVE-2025-1777

cve-icon Vulnrichment

Updated: 2025-06-06T15:44:01.765Z

cve-icon NVD

Status : Deferred

Published: 2025-06-06T06:15:31.163

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-1777

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-20T22:45:20Z

Weaknesses