Unrated severityNVD Advisory· Published Aug 29, 2024· Updated Apr 8, 2026
Beaver Builder (Lite Version) <= 2.8.3.5 - Authenticated (Contributor+) Stored Cross-Site Scripting via type Parameter
CVE-2024-7895
Description
The Beaver Builder – WordPress Page Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘type’ parameter in all versions up to, and including, 2.8.3.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Affected products
3- Range: <=2.8.3.5
- beaverbuilder/Beaver Builder Page Builder – Drag and Drop Website Builderv5Range: 0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- plugins.trac.wordpress.org/browser/beaver-builder-lite-version/trunk/modules/button-group/button-group.phpmitre
- plugins.trac.wordpress.org/browser/beaver-builder-lite-version/trunk/modules/button-group/includes/frontend.phpmitre
- plugins.trac.wordpress.org/changesetmitre
- wordpress.org/plugins/beaver-builder-lite-version/mitre
- www.wordfence.com/threat-intel/vulnerabilities/id/f83db067-843f-4dd8-b5d1-83e95c6c88ccmitre
- www.wpbeaverbuilder.com/change-logs/mitre
News mentions
0No linked articles in our index yet.