CVE-2024-9505

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') (CWE-79)

Published: Oct 29, 2024 / Updated: 21d ago

010
CVSS 5.4EPSS 0.07%Medium
CVE info copied to clipboard

Summary

The Beaver Builder – WordPress Page Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Button widget in all versions up to, and including, 2.8.4.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

Impact

This vulnerability allows authenticated attackers with contributor-level access or higher to inject malicious scripts into pages created with the Beaver Builder plugin. When users access these compromised pages, the injected scripts will execute in their browsers. This can lead to various adverse effects, including theft of sensitive information (such as login credentials or session tokens), manipulation of page content, or redirection to malicious websites. The impact is somewhat mitigated by the fact that it requires an authenticated user with at least contributor-level access, limiting the pool of potential attackers.

Exploitation

There is no evidence that a public proof-of-concept exists. There is no evidence of proof of exploitation at the moment.

Patch

A patch is available. The vulnerability has been fixed in version 2.8.4.3 of the Beaver Builder plugin. Users should update to this version or later to mitigate the risk.

Mitigation

1. Update the Beaver Builder plugin to version 2.8.4.3 or later immediately. 2. Review and audit user roles and permissions, ensuring that only trusted users have contributor-level access or above. 3. Implement regular security audits of WordPress installations and plugins. 4. Consider using Web Application Firewalls (WAF) or similar security measures to help detect and prevent XSS attacks. 5. Educate content creators about the risks of injecting unvalidated HTML or scripts into pages. 6. Regularly monitor and review pages created with the Beaver Builder plugin for any suspicious content or behavior.

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

Timeline

First Article

Feedly found the first article mentioning CVE-2024-9505. See article

Oct 29, 2024 at 1:58 PM / CVE
CVSS Estimate

Feedly estimated the CVSS score as MEDIUM

Oct 29, 2024 at 2:01 PM
CVE Assignment

NVD published the first details for CVE-2024-9505

Oct 29, 2024 at 2:15 PM
CVSS

A CVSS base score of 6.4 has been assigned.

Oct 29, 2024 at 2:21 PM / nvd
EPSS

EPSS Score was set to: 0.07% (Percentile: 31.2%)

Oct 30, 2024 at 10:18 AM
Static CVE Timeline Graph

Affected Systems

Fastlinemedia/beaver_builder
+null more

Patches

plugins.trac.wordpress.org
+null more

Attack Patterns

CAPEC-209: XSS Using MIME Type Mismatch
+null more

News

Wordfence Intelligence Weekly WordPress Vulnerability Report (October 28, 2024 to November 3, 2024)
WordPress Plugins with Reported Vulnerabilities Last Week All in-scope vulnerability types for WordPress plugins/themes with >= 1,000 active installations are in-scope for ALL researchers
cveNotify : 🚨 CVE-2024-9505The Beaver Builder – WordPress Page Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Button widget in all versions up to, and including, 2.8.4.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.🎖@cveNotify
cveNotify : 🚨 CVE-2024-9505The Beaver Builder – WordPress Page Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Button widget in all versions up to, and including, 2.8.4.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.🎖@cveNotify
null
- MEDIUM - CVE-2024-9505 The Beaver Builder – WordPress Page Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Button widget in all versions up to, and including, 2.8.4.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
CVE-2024-9505
Gravedad 3.1 (CVSS 3.1 Base Score) Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
CVE-2024-9505 - Beaver Builder WordPress Page Builder Stored Cross-Site Scripting Vulnerability
CVE ID : CVE-2024-9505 Published : Oct. 29, 2024, 2:15 p.m. 22 minutes ago Description : The Beaver Builder – WordPress Page Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Button widget in all versions up to, and including, 2.8.4.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. Severity: 6.4
See 6 more articles and social media posts

CVSS V3.1

Attack Vector:Network
Attack Complexity:Low
Privileges Required:Low
User Interaction:Required
Scope:Changed
Confidentiality:Low
Integrity:Low
Availability Impact:None

Categories

Be the first to know about critical vulnerabilities

Collect, analyze, and share vulnerability reports faster using AI