CVE-2024-4400

6.4 MEDIUM

📋 TL;DR

This stored XSS vulnerability in the BoldGrid Post and Page Builder WordPress plugin allows authenticated attackers with contributor-level permissions or higher to inject malicious scripts into website pages. When users visit compromised pages, the scripts execute in their browsers, potentially stealing credentials or performing unauthorized actions. WordPress sites using vulnerable plugin versions are affected.

💻 Affected Systems

Products:
  • Post and Page Builder by BoldGrid – Visual Drag and Drop Editor
Versions: Up to and including 1.26.4
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: WordPress sites with the vulnerable plugin installed and contributor-level users are at risk.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator credentials, deface websites, redirect visitors to malicious sites, or install backdoors for persistent access.

🟠

Likely Case

Attackers with contributor access inject malicious scripts to steal user session cookies or credentials, potentially escalating privileges.

🟢

If Mitigated

With proper input validation and output escaping, malicious scripts are neutralized before reaching users' browsers.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires authenticated access with contributor permissions or higher. The vulnerability is in an unknown parameter with insufficient sanitization.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.26.5

Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3087230/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'Post and Page Builder by BoldGrid' and click 'Update Now'. 4. Verify version is 1.26.5 or higher.

🔧 Temporary Workarounds

Remove Contributor Access

all

Temporarily revoke contributor-level permissions from untrusted users to prevent exploitation.

Disable Plugin

all

Deactivate the vulnerable plugin until patched, but this may break site functionality.

🧯 If You Can't Patch

  • Implement strict Content Security Policy (CSP) headers to limit script execution.
  • Use web application firewall (WAF) rules to block XSS payloads in plugin parameters.

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Installed Plugins for 'Post and Page Builder by BoldGrid' version 1.26.4 or lower.

Check Version:

wp plugin list --name='post-and-page-builder' --field=version

Verify Fix Applied:

Confirm plugin version is 1.26.5 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to plugin endpoints with script-like payloads in parameters.
  • Multiple page edits by contributor-level users in short timeframes.

Network Indicators:

  • Inbound requests containing JavaScript payloads to plugin-specific URLs.

SIEM Query:

source="wordpress.log" AND ("post-and-page-builder" OR "boldgrid") AND ("<script>" OR "javascript:" OR "onerror=" OR "onload=")

🔗 References

📤 Share & Export