CVE-2024-47298

6.5 MEDIUM

📋 TL;DR

This stored XSS vulnerability in Bold Page Builder allows attackers to inject malicious scripts into WordPress pages. When users view compromised pages, the scripts execute in their browsers, potentially stealing credentials or performing unauthorized actions. All WordPress sites using Bold Page Builder versions up to 5.1.1 are affected.

💻 Affected Systems

Products:
  • BoldThemes Bold Page Builder WordPress Plugin
Versions: All versions up to and including 5.1.1
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with Bold Page Builder plugin enabled. No special configuration needed for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator session cookies, take over WordPress sites, deface content, or redirect visitors to malicious sites.

🟠

Likely Case

Attackers inject malicious scripts to steal user credentials, session tokens, or perform actions on behalf of authenticated users.

🟢

If Mitigated

With proper input validation and output encoding, malicious scripts would be neutralized before reaching users' browsers.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Stored XSS vulnerabilities are commonly weaponized. Exploitation requires attacker to have content creation privileges in WordPress.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.1.2 or later

Vendor Advisory: https://patchstack.com/database/vulnerability/bold-page-builder/wordpress-bold-page-builder-plugin-5-1-1-cross-site-scripting-xss-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find Bold Page Builder. 4. Click 'Update Now' if available. 5. Alternatively, download version 5.1.2+ from WordPress repository and replace plugin files.

🔧 Temporary Workarounds

Disable Plugin

all

Temporarily disable Bold Page Builder plugin until patched

wp plugin deactivate bold-page-builder

Restrict User Roles

all

Limit content creation/editing permissions to trusted users only

🧯 If You Can't Patch

  • Implement Content Security Policy (CSP) headers to restrict script execution
  • Use web application firewall (WAF) rules to block XSS payloads

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Bold Page Builder version number

Check Version:

wp plugin get bold-page-builder --field=version

Verify Fix Applied:

Confirm plugin version is 5.1.2 or higher in WordPress admin panel

📡 Detection & Monitoring

Log Indicators:

  • Unusual content modifications in WordPress posts/pages
  • Suspicious script tags in page builder content

Network Indicators:

  • Requests containing script injection patterns to WordPress admin endpoints

SIEM Query:

source="wordpress.log" AND ("bold-page-builder" OR "page_builder") AND ("script" OR "javascript:" OR "onerror=" OR "onload=")

🔗 References

📤 Share & Export