<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Brizy – Page Builder Plugin &lt;= 2.8.11 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/brizy--page-builder-plugin--2.8.11/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 02 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/brizy--page-builder-plugin--2.8.11/feed.xml" rel="self" type="application/rss+xml"/><item><title>Brizy WordPress Plugin Unauthenticated Stored XSS Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-brizy-xss/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-brizy-xss/</guid><description>The Brizy – Page Builder plugin for WordPress is vulnerable to Unauthenticated Stored Cross-Site Scripting (XSS) in versions up to and including 2.8.11, allowing unauthenticated attackers to inject arbitrary web scripts that execute when an administrator views the form Leads page due to missing nonce verification and improper handling of file upload fields.</description><content:encoded><![CDATA[<p>The Brizy – Page Builder plugin for WordPress, a popular tool for designing website pages, contains a critical vulnerability that allows unauthenticated users to inject malicious JavaScript code. Specifically, versions up to and including 2.8.11 are affected. This vulnerability arises from a combination of factors, including the lack of nonce verification for form submissions from non-logged-in users, inadequate handling of FileUpload fields when no file is actually uploaded, and the unintended reversal of security encoding through <code>html_entity_decode()</code> before outputting data. This allows attackers to inject arbitrary web scripts that execute in the context of a logged-in administrator viewing the form&rsquo;s &ldquo;Leads&rdquo; page, potentially leading to account takeover, data theft, or further compromise of the WordPress site.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker crafts a malicious payload containing JavaScript code.</li>
<li>The attacker submits this payload through a Brizy form on the WordPress site, exploiting the missing nonce verification in the <code>submit_form()</code> function.</li>
<li>The <code>handleFileTypeFields()</code> function fails to properly sanitize or overwrite the attacker-supplied values when no file is attached to the form submission.</li>
<li>The injected payload, now stored in the WordPress database, bypasses initial <code>htmlentities()</code> encoding due to later <code>html_entity_decode()</code>.</li>
<li>An administrator logs into the WordPress dashboard and navigates to the &ldquo;Leads&rdquo; page to view form submissions.</li>
<li>The form-data.php template retrieves the stored malicious payload from the database.</li>
<li>The payload is outputted directly within the <code>href</code> attribute of an HTML element without proper escaping using <code>esc_url()</code>.</li>
<li>The injected JavaScript code executes within the administrator&rsquo;s browser, potentially performing actions such as stealing cookies or redirecting the administrator to a malicious site.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an unauthenticated attacker to execute arbitrary JavaScript code in the context of a logged-in administrator&rsquo;s browser. This could lead to a full compromise of the WordPress site, including the ability to create new administrative accounts, modify existing content, inject malware into the site&rsquo;s pages, or steal sensitive data. The impact is significant, as it requires no user interaction beyond an administrator viewing the form submissions within the Brizy plugin.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Brizy – Page Builder plugin to the latest version to patch CVE-2026-5324.</li>
<li>Deploy the Sigma rule &ldquo;Detect Brizy WordPress Plugin XSS Attempt via HTTP Request&rdquo; to identify potential exploitation attempts in web server logs.</li>
<li>Review the <code>form-data.php</code> template and implement proper output escaping using <code>esc_url()</code> for all user-supplied data to prevent XSS, as mentioned in the vulnerability description.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>wordpress</category><category>xss</category><category>unauthenticated</category></item></channel></rss>