The Beaver Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Icon Widget 'fl_builder_data[node_preview][link]' and 'fl_builder_data[settings][link_target]' parameters in all versions up to, and including, 2.7.4.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Metrics
Affected Vendors & Products
References
History
Thu, 02 Jan 2025 17:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Fastlinemedia
Fastlinemedia beaver Builder |
|
Weaknesses | CWE-79 | |
CPEs | cpe:2.3:a:fastlinemedia:beaver_builder:*:*:*:*:lite:wordpress:*:* | |
Vendors & Products |
Fastlinemedia
Fastlinemedia beaver Builder |

Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2024-08-01T18:18:18.884Z
Reserved: 2024-01-24T20:36:59.182Z
Link: CVE-2024-0871

Updated: 2024-08-01T18:18:18.884Z

Status : Analyzed
Published: 2024-03-13T16:15:14.750
Modified: 2025-01-02T17:16:05.363
Link: CVE-2024-0871

No data.