CVE-2024-1164

6.4 MEDIUM

📋 TL;DR

The Brizy Page Builder WordPress plugin has a stored XSS vulnerability that allows authenticated attackers with contributor-level permissions or higher to inject malicious scripts into pages. These scripts execute when users visit the compromised pages, potentially stealing session cookies or redirecting users. All WordPress sites using Brizy Page Builder versions up to 2.4.43 are affected.

💻 Affected Systems

Products:
  • Brizy - Page Builder WordPress plugin
Versions: All versions up to and including 2.4.43
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with Brizy plugin and at least one user with contributor role or higher.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator session cookies, take over WordPress sites, install backdoors, deface websites, or redirect users to malicious sites.

🟠

Likely Case

Attackers inject malicious scripts to steal user session cookies, perform phishing attacks, or redirect users to malicious content.

🟢

If Mitigated

With proper user role management and input validation, impact is limited to low-privileged user account compromise.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access with contributor role or higher. The vulnerability is in contact form widget error messages and redirect URLs.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.4.44

Vendor Advisory: https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3086506%40brizy%2Ftrunk&old=3058896%40brizy%2Ftrunk

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find Brizy Page Builder. 4. Click 'Update Now' if available. 5. Alternatively, download version 2.4.44+ from WordPress repository and manually update.

🔧 Temporary Workarounds

Disable Brizy Plugin

all

Temporarily disable the Brizy Page Builder plugin until patched.

wp plugin deactivate brizy

Restrict User Roles

all

Remove contributor roles from untrusted users and limit who can create/edit pages.

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block XSS payloads in contact form submissions.
  • Regularly audit user accounts and remove unnecessary contributor-level permissions.

🔍 How to Verify

Check if Vulnerable:

Check Brizy plugin version in WordPress admin panel under Plugins > Installed Plugins.

Check Version:

wp plugin get brizy --field=version

Verify Fix Applied:

Verify Brizy plugin version is 2.4.44 or higher in WordPress admin.

📡 Detection & Monitoring

Log Indicators:

  • Unusual contact form submissions with script tags
  • Multiple page edits by contributor-level users

Network Indicators:

  • Unexpected JavaScript execution from contact form pages
  • Suspicious redirects from Brizy pages

SIEM Query:

source="wordpress" AND ("brizy" OR "contact form") AND ("script" OR "javascript" OR "onerror")

🔗 References

📤 Share & Export