Fortinet Discovers WordPress Beaver Builder Plugin Cross-Site Scripting Vulnerability
Fortinet's FortiGuard Labs has discovered a Stored Cross Site Scripting vulnerability in the WordPress Beaver Builder Plugin.
Beaver Builder is a flexible drag and drop page builder that works on the front end of your WordPress website.
The Beaver Builder is vulnerable to Stored Cross-Site Scripting via the 'caption' parameter added to images via the media uploader due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with access to the Beaver Builder editor and the ability to upload media files to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
SolutionsFortiGuard Labs released the following FortiGate IPS signature which covers this specific vulnerability:
Released Aug 17, 2022
Users should apply the solution provided by The Beaver Builder Team.
Fortinet reported the vulnerability to The Beaver Builder Team on June 05, 2020
The Beaver Builder Team confirmed the vulnerability on June 07, 2020
The Beaver Builder Team patched the vulnerability on August 09, 2022