Impact
A stored cross‑site scripting flaw exists in the WPBakery Page Builder WordPress plugin, allowing an authenticated user with contributor or higher access to inject arbitrary JavaScript into a page through several builder elements. The attacker can place malicious code into attributes of elements such as Copyright, Hover Box, FAQ, and various charts, and the script will run each time the page is viewed by any user. This vulnerability arises from insufficient input validation and output escaping and is classified as CWE‑79.
Affected Systems
The vulnerability affects all installations of WPBakery Page Builder version 8.4.1 or earlier. It applies to the WordPress plugin distributed by wpbakery and includes all supported page builder components. The plugin is widely deployed on many WordPress sites, making the scope of exposure broad for any site operating on the affected software version.
Risk and Exploitability
The CVSS base score of 6.4 indicates a moderate level of severity. The EPSS score is reported as less than 1%, suggesting a low probability of exploitation at the time, and the vulnerability is not listed in CISA’s KEV catalog. Because exploitation requires only contributor‑level access, it is relatively easy for authenticated users to leverage the flaw. The risk is moderate, especially on sites with many contributors.
OpenCVE Enrichment
EUVD