First published: Thu Mar 07 2024(Updated: )
The Page Builder: Pagelayer – Drag and Drop website builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via custom attributes in all versions up to, and including, 1.8.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Pagelayer | <=1.8.3 | |
Pagelayer | <1.8.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-2127 has been classified with a high severity due to its potential for Stored Cross-Site Scripting.
To fix CVE-2024-2127, update the Pagelayer plugin to the latest version beyond 1.8.3 where the vulnerability has been addressed.
CVE-2024-2127 affects any WordPress site using the Pagelayer plugin version 1.8.3 or earlier.
CVE-2024-2127 is a stored cross-site scripting (XSS) vulnerability.
Yes, an authenticated attacker can exploit CVE-2024-2127 remotely to execute malicious scripts.