Description
The Page Builder: Pagelayer plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Button widget's Custom Attributes field in all versions up to, and including, 2.0.8. This is due to an incomplete event handler blocklist in the 'pagelayer_xss_content' XSS filtering function, which blocks common, but not all, event handlers. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: 2026-04-08
Score: 6.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting
Action: Update
AI Analysis

Impact

The Page Builder: Pagelayer plugin for WordPress contains a stored cross‑site scripting vulnerability in the Button widget's Custom Attributes field. The flaw arises from an incomplete event‑handler blocklist in the 'pagelayer_xss_content' filtering function, allowing developers with Contributor level or higher to inject arbitrary JavaScript. Once injected, the script executes each time a user views the affected page, potentially leaking session data, defacing content, or executing malicious actions on behalf of that user. The weakness corresponds to CWE‑79.

Affected Systems

Affected vendors include Softaculous, the developer of the Page Builder: Pagelayer WordPress plugin. All plugin releases up through 2.0.8 are vulnerable. The vulnerability arises only on installations where authenticated users with Contributor or higher permissions have access to edit or create pages containing the Button widget. All WordPress sites that use these plugin versions and permit such contributor roles are at risk.

Risk and Exploitability

The vulnerability has a CVSS score of 6.4, indicating a moderate severity. EPSS data is unavailable, and the issue is not listed in the CISA Known Exploited Vulnerabilities catalog, so an active exploit is not confirmed. However, the required level of access—Contributor or higher—means that any trusted contributor could exploit the flaw. An attacker can embed persistent malicious code that will run for all visitors to the affected page, including non‑authenticated users, leading to possible session hijacking, data theft, or defacement. The risk is therefore significant for WordPress sites that use the plugin and grant contributor access.

Generated by OpenCVE AI on April 8, 2026 at 14:36 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Pagelayer to the latest version (>=2.0.9)
  • If upgrade is impossible, remove the plugin or disable custom attributes
  • Restrict Contributor-level access to trusted users only
  • Scrutinize pages for injected scripts and purge them
  • Apply a web application firewall rule to detect and block XSS payloads

Generated by OpenCVE AI on April 8, 2026 at 14:36 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 08 Apr 2026 19:30:00 +0000

Type Values Removed Values Added
First Time appeared Softaculous
Softaculous page Builder: Pagelayer – Drag And Drop Website Builder
Wordpress
Wordpress wordpress
Vendors & Products Softaculous
Softaculous page Builder: Pagelayer – Drag And Drop Website Builder
Wordpress
Wordpress wordpress

Wed, 08 Apr 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 08 Apr 2026 13:45:00 +0000

Type Values Removed Values Added
Description The Page Builder: Pagelayer plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Button widget's Custom Attributes field in all versions up to, and including, 2.0.8. This is due to an incomplete event handler blocklist in the 'pagelayer_xss_content' XSS filtering function, which blocks common, but not all, event handlers. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Title Page Builder: Pagelayer <= 2.0.8 - Authenticated (Contributor+) Stored Cross-Site Scripting via Button Widget Custom Attributes
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Softaculous Page Builder: Pagelayer – Drag And Drop Website Builder
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:09:13.112Z

Reserved: 2026-02-13T23:40:04.816Z

Link: CVE-2026-2509

cve-icon Vulnrichment

Updated: 2026-04-08T14:47:18.716Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-08T14:16:27.693

Modified: 2026-04-08T21:26:13.410

Link: CVE-2026-2509

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-08T19:39:31Z

Weaknesses