Description
The Page Builder: Pagelayer – Drag and Drop website builder plugin for WordPress is vulnerable to Improper Neutralization of CRLF Sequences ('CRLF Injection') in all versions up to, and including, 2.0.7. This is due to the contact form handler performing placeholder substitution on attacker-controlled form fields and then passing the resulting values into email headers without removing CR/LF characters. This makes it possible for unauthenticated attackers to inject arbitrary email headers (for example Bcc / Cc) and abuse form email delivery via the 'email' parameter granted they can target a contact form configured to use placeholders in mail template headers.
Published: 2026-03-28
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Untrusted email header injection
Action: Patch
AI Analysis

Impact

The Page Builder: Pagelayer – Drag and Drop website builder plugin for WordPress allows unauthenticated users to inject arbitrary email headers by exploiting improper CRLF neutralization in the contact form handler. The vulnerability stems from placeholder substitution that is then inserted into email headers without sanitization, enabling header injection such as Bcc or Cc. This can be used to send spam or redirect mail from the site, compromising the integrity of the website’s email system.

Affected Systems

Affected systems are installations of the Pagelayer plugin for WordPress, developed by Softaculous, up to and including version 2.0.7. Any WordPress site that has the contact form feature enabled and uses placeholder values in email headers is susceptible.

Risk and Exploitability

The CVSS base score of 5.3 indicates medium severity. EPSS data is not available, and the vulnerability is not listed in CISA KEV, but the lack of authentication required and the publicly accessible contact form make exploitation straightforward. Attackers can exploit the flaw by submitting crafted form data to inject headers, thereby misusing the site’s email functionality or sending unwanted mail.

Generated by OpenCVE AI on March 28, 2026 at 10:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Pagelayer to a version newer than 2.0.7.
  • If a patch is unavailable, disable placeholder usage in the email header template of the contact form to prevent CRLF injection.
  • Apply server‑side sanitization to strip CR/LF characters from form input before it is used in email headers.
  • Monitor email logs for unexpected header usage or unusual outbound mail activity.

Generated by OpenCVE AI on March 28, 2026 at 10:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 28 Mar 2026 09:45:00 +0000

Type Values Removed Values Added
Description The Page Builder: Pagelayer – Drag and Drop website builder plugin for WordPress is vulnerable to Improper Neutralization of CRLF Sequences ('CRLF Injection') in all versions up to, and including, 2.0.7. This is due to the contact form handler performing placeholder substitution on attacker-controlled form fields and then passing the resulting values into email headers without removing CR/LF characters. This makes it possible for unauthenticated attackers to inject arbitrary email headers (for example Bcc / Cc) and abuse form email delivery via the 'email' parameter granted they can target a contact form configured to use placeholders in mail template headers.
Title Pagelayer <= 2.0.7 - Improper Neutralization of CRLF Sequences to Unauthenticated Email Header Injection via 'email'
Weaknesses CWE-93
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-03-28T09:27:10.474Z

Reserved: 2026-02-13T01:21:59.845Z

Link: CVE-2026-2442

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-03-28T10:16:30.980

Modified: 2026-03-28T10:16:30.980

Link: CVE-2026-2442

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-29T20:32:37Z

Weaknesses