CVE-2024-3667
📋 TL;DR
The Brizy Page Builder WordPress plugin has a stored XSS vulnerability in its 'Link To' field across multiple widgets. Authenticated attackers with contributor-level access or higher can inject malicious scripts that execute when users view compromised pages. This affects all WordPress sites using Brizy Page Builder versions up to 2.4.43.
💻 Affected Systems
- Brizy - Page Builder WordPress Plugin
📦 What is this software?
Brizy by Brizy
⚠️ Risk & Real-World Impact
Worst Case
Attackers could steal administrator credentials, redirect users to malicious sites, deface websites, or install backdoors for persistent access.
Likely Case
Attackers with contributor access inject malicious scripts to steal user session cookies or redirect visitors to phishing sites.
If Mitigated
With proper input validation and output escaping, the vulnerability is eliminated; existing attacks would be neutralized.
🎯 Exploit Status
Exploitation requires authenticated access; contributor role or higher is sufficient. The vulnerability is straightforward to exploit once authenticated.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 2.4.44
Vendor Advisory: https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3086506%40brizy%2Ftrunk&old=3058896%40brizy%2Ftrunk
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find Brizy Page Builder and click 'Update Now'. 4. Verify version is 2.4.44 or higher.
🔧 Temporary Workarounds
Restrict User Roles
allLimit contributor-level access to trusted users only; consider removing contributor role if not needed.
Disable Brizy Plugin
linuxTemporarily deactivate Brizy Page Builder until patched.
wp plugin deactivate brizy
🧯 If You Can't Patch
- Implement strict Content Security Policy (CSP) headers to mitigate XSS impact.
- Use web application firewall (WAF) rules to block XSS payloads in 'Link To' fields.
🔍 How to Verify
Check if Vulnerable:
Check Brizy plugin version in WordPress admin under Plugins > Installed Plugins; if version is 2.4.43 or lower, it's vulnerable.
Check Version:
wp plugin get brizy --field=version
Verify Fix Applied:
After updating, confirm version is 2.4.44 or higher in the plugin list.
📡 Detection & Monitoring
Log Indicators:
- Unusual POST requests to Brizy widget endpoints with script tags in parameters
- Multiple page edits by contributor users in short timeframes
Network Indicators:
- Outbound connections to unknown domains from Brizy plugin pages
- Script injections in page source code
SIEM Query:
source="wordpress" AND (uri_path="/wp-admin/admin-ajax.php" AND parameters CONTAINS "brizy" AND parameters CONTAINS "<script>")
🔗 References
- https://plugins.trac.wordpress.org/browser/brizy/trunk/public/editor-build/282-wp/editor/js
- https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3086506%40brizy%2Ftrunk&old=3058896%40brizy%2Ftrunk&sfp_email=&sfph_mail=
- https://www.wordfence.com/threat-intel/vulnerabilities/id/f0edfebc-bf6b-4346-9cd7-ce00007e3620?source=cve
- https://plugins.trac.wordpress.org/browser/brizy/trunk/public/editor-build/282-wp/editor/js
- https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3086506%40brizy%2Ftrunk&old=3058896%40brizy%2Ftrunk&sfp_email=&sfph_mail=
- https://www.wordfence.com/threat-intel/vulnerabilities/id/f0edfebc-bf6b-4346-9cd7-ce00007e3620?source=cve