Description
The Beaver Builder – WordPress Page Builder plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘'fl_builder' parameter in all versions up to, and including, 2.9.2.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Published: 2025-08-28
Score: 6.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Reflected Cross‑Site Scripting
Action: Apply Patch
AI Analysis

Impact

The Beaver Builder – WordPress Page Builder plugin for WordPress is vulnerable to reflected cross‑site scripting through the 'fl_builder' GET parameter. In all versions up to and including 2.9.2.1 the plugin does not properly sanitize or escape user‑supplied input, allowing an attacker to embed arbitrary JavaScript that will run in the context of a victim’s browser when the victim follows a crafted link or clicks a malicious button. This flaw can lead to theft of session cookies, defacement of content, or execution of additional malicious code on the victim’s machine.

Affected Systems

Vulnerable systems are installations of the Beaver Builder Lite Page Builder – Drag and Drop Website Builder for WordPress. Versions 2.9.2.1 and older are affected; any deployment of the plugin without an update beyond this release is at risk. The vulnerability is tied to the plugin’s core code and not to the underlying WordPress platform itself.

Risk and Exploitability

The CVSS score of 6.1 places the weakness in the moderate severity range, but the EPSS score of less than 1% indicates that it is currently not widely exploited. The flaw is remote, unauthenticated, and does not require any prior access; an attacker only needs to lure a user to a URL containing a malicious 'fl_builder' value. The vulnerability is not listed in CISA’s KEV catalog, suggesting no widespread active exploitation as of now. Nonetheless, the impact to a business that relies on the plugin is high if an attacker succeeds in compromising a user’s session or injecting malware through the site.

Generated by OpenCVE AI on April 21, 2026 at 03:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Beaver Builder plugin to the latest version (any release newer than 2.9.2.1).
  • If an upgrade is not immediately possible, block or strip the 'fl_builder' GET parameter using a web application firewall or server configuration rule to prevent malicious input from reaching the plugin.
  • If the plugin is not required, remove or disable it from the WordPress installation to eliminate the risk entirely.

Generated by OpenCVE AI on April 21, 2026 at 03:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-28808 The Beaver Builder – WordPress Page Builder plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘'fl_builder' parameter in all versions up to, and including, 2.9.2.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
History

Thu, 11 Dec 2025 20:45:00 +0000

Type Values Removed Values Added
First Time appeared Fastlinemedia
Fastlinemedia beaver Builder
CPEs cpe:2.3:a:fastlinemedia:beaver_builder:*:*:*:*:lite:wordpress:*:*
Vendors & Products Fastlinemedia
Fastlinemedia beaver Builder

Thu, 28 Aug 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 28 Aug 2025 02:30:00 +0000

Type Values Removed Values Added
Description The Beaver Builder – WordPress Page Builder plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘'fl_builder' parameter in all versions up to, and including, 2.9.2.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Title Beaver Builder Plugin (Lite Version) <= 2.9.2.1 - Reflected Cross-Site Scripting
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}


Subscriptions

Fastlinemedia Beaver Builder
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:09:39.249Z

Reserved: 2025-08-12T17:40:00.527Z

Link: CVE-2025-8897

cve-icon Vulnrichment

Updated: 2025-08-28T14:24:34.582Z

cve-icon NVD

Status : Analyzed

Published: 2025-08-28T03:15:38.333

Modified: 2025-12-11T20:31:09.253

Link: CVE-2025-8897

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T03:30:26Z

Weaknesses