CVE-2025-11160

6.4 MEDIUM

📋 TL;DR

This vulnerability allows authenticated WordPress users with contributor-level access or higher to inject malicious JavaScript code via the WPBakery Page Builder's Custom JS module. The injected scripts execute whenever users visit affected pages, enabling attackers to steal session cookies, redirect users, or perform other malicious actions. All WordPress sites using WPBakery Page Builder versions up to 8.6.1 are affected.

💻 Affected Systems

Products:
  • WPBakery Page Builder for WordPress
Versions: All versions up to and including 8.6.1
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WPBakery Page Builder plugin installed and active. Vulnerability is exploitable by any authenticated user with contributor-level permissions or higher who has access to the WPBakery editor.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator session cookies, take over WordPress sites, install backdoors, or redirect users to malicious sites, potentially leading to complete site compromise and data theft.

🟠

Likely Case

Attackers with contributor access inject malicious scripts to steal user session cookies, perform phishing attacks, or deface websites by modifying page content.

🟢

If Mitigated

With proper user access controls and input validation, the impact is limited to potential content defacement or minor data exposure from lower-privileged accounts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires authenticated access to WordPress backend with at least contributor permissions. Attackers need to understand WordPress and WPBakery Page Builder interface.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 8.6.2 or later

Vendor Advisory: https://kb.wpbakery.com/docs/preface/release-notes/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find WPBakery Page Builder. 4. Click 'Update Now' if update available. 5. Alternatively, download latest version from WordPress repository and manually update.

🔧 Temporary Workarounds

Disable Custom JS Module

all

Temporarily disable the vulnerable Custom JS module in WPBakery Page Builder settings

Restrict User Permissions

all

Remove contributor-level access to WPBakery Page Builder editor for all non-administrator users

🧯 If You Can't Patch

  • Implement strict user access controls to limit who can edit posts/pages with WPBakery Page Builder
  • Deploy web application firewall (WAF) rules to detect and block XSS payloads in POST requests

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Installed Plugins > WPBakery Page Builder version. If version is 8.6.1 or lower, system is vulnerable.

Check Version:

wp plugin list --name=WPBakery --field=version (if WP-CLI installed)

Verify Fix Applied:

After updating, verify WPBakery Page Builder version shows 8.6.2 or higher in WordPress plugins list.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to wp-admin containing JavaScript payloads
  • Multiple failed login attempts followed by successful contributor-level login

Network Indicators:

  • Unexpected JavaScript code in page responses from WordPress sites
  • Suspicious outbound connections from WordPress sites to unknown domains

SIEM Query:

source="wordpress.log" AND ("custom_js" OR "wpbakery") AND ("script" OR "javascript" OR "onload" OR "onerror")

🔗 References

📤 Share & Export