CVE-2024-8618

4.8 MEDIUM

📋 TL;DR

This vulnerability in the Page Builder: Pagelayer WordPress plugin allows administrators to inject malicious scripts into plugin settings, which then execute when other users view affected pages. It affects WordPress sites using Pagelayer plugin versions before 1.9.0, particularly in multisite configurations where unfiltered_html capability is restricted.

💻 Affected Systems

Products:
  • WordPress Page Builder: Pagelayer plugin
Versions: All versions before 1.9.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires admin-level access. Particularly dangerous in WordPress multisite setups where unfiltered_html is disallowed for security.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Administrator account compromise leads to site-wide XSS payload execution, potentially stealing session cookies, redirecting users to malicious sites, or performing actions as authenticated users.

🟠

Likely Case

Malicious admin injects XSS payloads that execute for other users, potentially compromising their accounts or performing unauthorized actions.

🟢

If Mitigated

With proper admin account security and regular patching, impact is limited to potential data exposure from compromised admin accounts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires admin privileges. Public proof-of-concept available via WPScan references.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.9.0

Vendor Advisory: https://wpscan.com/vulnerability/acddcf33-0a18-499e-b42d-c8b49f2c4de5/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'Page Builder: Pagelayer'. 4. Click 'Update Now' if available. 5. Alternatively, download version 1.9.0+ from WordPress repository and manually update.

🔧 Temporary Workarounds

Remove vulnerable plugin

linux

Temporarily disable or remove the Pagelayer plugin until patched

wp plugin deactivate pagelayer
wp plugin delete pagelayer

Restrict admin access

all

Temporarily limit admin account usage and implement strong authentication

🧯 If You Can't Patch

  • Implement strict admin account monitoring and review all plugin settings for suspicious content
  • Use web application firewall rules to block XSS payloads in plugin settings

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Installed Plugins for Page Builder: Pagelayer version. If version is below 1.9.0, you are vulnerable.

Check Version:

wp plugin get pagelayer --field=version

Verify Fix Applied:

After update, verify plugin version shows 1.9.0 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual admin activity modifying plugin settings
  • Multiple failed login attempts to admin accounts
  • Suspicious JavaScript in plugin configuration

Network Indicators:

  • Unexpected outbound connections from WordPress admin sessions
  • Suspicious payloads in POST requests to wp-admin/admin-ajax.php

SIEM Query:

source="wordpress.log" AND ("pagelayer" OR "plugin settings") AND ("admin" OR "wp-admin") AND ("update" OR "modify")

🔗 References

📤 Share & Export