CVE-2025-12803
Stored XSS in Bold Page Builder Plugin via bt_bb_tabs Shortcode
Publication date: 2026-02-07
Last updated on: 2026-02-07
Assigner: Wordfence
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| bold_page_builder | plugin | to 5.5.1 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-80 | The product receives input from an upstream component, but it does not neutralize or incorrectly neutralizes special characters such as "<", ">", and "&" that could be interpreted as web-scripting elements when they are sent to a downstream component that processes web pages. |
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
Can you explain this vulnerability to me?
The Bold Page Builder plugin for WordPress has a Stored Cross-Site Scripting (XSS) vulnerability in its 'bt_bb_tabs' shortcode in all versions up to and including 5.5.1.
This vulnerability arises because the plugin does not properly sanitize or escape user-supplied attributes, allowing attackers with contributor-level access or higher to inject malicious scripts.
These injected scripts are stored and executed whenever any user accesses the affected page.
How can this vulnerability impact me? :
An attacker with contributor-level access or above can exploit this vulnerability to inject arbitrary web scripts into pages.
These scripts execute in the context of users visiting the infected pages, potentially leading to theft of user credentials, session hijacking, or unauthorized actions performed on behalf of users.
The vulnerability has a CVSS v3.1 base score of 6.4, indicating a medium severity with network attack vector, low attack complexity, and no user interaction required.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
I don't know