CVE-2023-51398

8.8 HIGH

📋 TL;DR

This vulnerability allows attackers to escalate privileges in WordPress sites using the Ultimate Addons for Beaver Builder plugin. Attackers could gain administrative access without proper authorization. All WordPress sites running affected versions of this plugin are at risk.

💻 Affected Systems

Products:
  • Ultimate Addons for Beaver Builder (WordPress plugin)
Versions: All versions through 1.35.14
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects WordPress installations with the Ultimate Addons for Beaver Builder plugin installed and activated.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full site compromise where attackers gain administrative access, install backdoors, steal sensitive data, deface websites, or use the site for further attacks.

🟠

Likely Case

Attackers gain administrative privileges to modify content, install malicious plugins/themes, or access sensitive user data.

🟢

If Mitigated

Limited impact if proper access controls, monitoring, and least privilege principles are already implemented.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires some level of access to the WordPress site, but privilege escalation vulnerabilities are commonly exploited.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.35.15 or later

Vendor Advisory: https://patchstack.com/database/vulnerability/bb-ultimate-addon/wordpress-ultimate-addons-for-beaver-builder-premium-plugin-1-35-14-privilege-escalation-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel
2. Go to Plugins → Installed Plugins
3. Find Ultimate Addons for Beaver Builder
4. Click 'Update Now' if available
5. If manual update needed, download latest version from Brainstorm Force
6. Deactivate plugin, upload new version via FTP, reactivate

🔧 Temporary Workarounds

Temporary Plugin Deactivation

all

Deactivate the vulnerable plugin until patched

wp plugin deactivate bb-ultimate-addon

Restrict Admin Access

linux

Limit administrative access to trusted IP addresses only

# Add to .htaccess for Apache:
Order deny,allow
Deny from all
Allow from 192.168.1.0/24
Allow from 10.0.0.0/8
# Add to nginx config:
location /wp-admin {
    allow 192.168.1.0/24;
    allow 10.0.0.0/8;
    deny all;
}

🧯 If You Can't Patch

  • Remove the Ultimate Addons for Beaver Builder plugin completely
  • Implement strict access controls and monitor for suspicious admin activity

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Ultimate Addons for Beaver Builder version. If version is 1.35.14 or earlier, you are vulnerable.

Check Version:

wp plugin get bb-ultimate-addon --field=version

Verify Fix Applied:

Verify plugin version is 1.35.15 or later in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual privilege escalation attempts in WordPress logs
  • Multiple failed login attempts followed by successful admin access
  • New administrator accounts created unexpectedly

Network Indicators:

  • Unusual admin panel access patterns
  • Traffic from unexpected locations to /wp-admin

SIEM Query:

source="wordpress.log" AND ("admin" OR "privilege" OR "escalation") AND ("failed" OR "success" OR "new user")

🔗 References

📤 Share & Export