Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

900+ Articles
122+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. Security
  3. CVE-2026-5324: WordPress Brizy Page Builder Unauthenticated Stored XSS
CVE-2026-5324: WordPress Brizy Page Builder Unauthenticated Stored XSS
SECURITYHIGHCVE-2026-5324

CVE-2026-5324: WordPress Brizy Page Builder Unauthenticated Stored XSS

The Brizy Page Builder plugin for WordPress contains a critical unauthenticated Stored Cross-Site Scripting flaw in versions up to 2.8.11, enabling attackers to inject persistent malicious scripts via unprotected form submissions.

Dylan H.

Security Team

May 3, 2026
3 min read

Affected Products

  • Brizy – Page Builder plugin for WordPress, versions up to and including 2.8.11

Overview

A High-severity stored cross-site scripting (XSS) vulnerability has been disclosed in the Brizy – Page Builder plugin for WordPress. Tracked as CVE-2026-5324 with a CVSS score of 7.2, the flaw allows unauthenticated attackers to inject persistent JavaScript into WordPress pages by exploiting missing nonce verification and improper handling of file upload fields in publicly accessible forms.

Vulnerability Details

FieldValue
CVE IDCVE-2026-5324
CVSS Score7.2 (High)
Affected VersionsBrizy – Page Builder ≤ 2.8.11
Vulnerability TypeUnauthenticated Stored Cross-Site Scripting (XSS)
Published2026-05-02
SourceNVD / NIST

Technical Root Cause

The vulnerability arises from two compounding weaknesses in the Brizy Page Builder plugin:

  1. Missing nonce verification on unauthenticated form submission endpoints — the plugin fails to validate CSRF nonces before processing form data submitted by anonymous users.
  2. Insufficient sanitization of FileUpload field values — when no proper input filtering is applied to file-related form fields, an attacker can craft payloads that persist malicious JavaScript in the WordPress database.

When a victim with a privileged session (e.g., an administrator) visits a page containing the injected payload, the script executes in their browser context. This can be leveraged to:

  • Hijack administrator sessions and steal authentication cookies
  • Create rogue administrator accounts
  • Deploy backdoors or redirect site visitors to malicious domains
  • Modify site content or inject cryptomining scripts

Attack Vector

The attack is fully unauthenticated — no WordPress login is required. An attacker simply submits a crafted form payload to any page using a Brizy contact or lead-capture form. Because the XSS payload is stored server-side, every subsequent page load triggers execution for affected visitors.

Affected Versions

All versions of the Brizy – Page Builder plugin up to and including 2.8.11 are confirmed vulnerable. Brizy is a widely deployed drag-and-drop WordPress builder with hundreds of thousands of active installations.

Remediation

Immediate Actions

  1. Update immediately — upgrade the Brizy Page Builder plugin to the latest patched version (2.8.12 or newer) via the WordPress plugin dashboard or by downloading directly from the WordPress plugin repository.
  2. Audit existing content — review pages built with Brizy forms for evidence of stored malicious payloads, particularly in form submissions and file upload fields.
  3. Check administrator accounts — audit your WordPress user list for unauthorized accounts that may have been created through XSS-based privilege escalation.

If Immediate Update Is Not Possible

  • Temporarily disable the Brizy Page Builder plugin until patching can be applied.
  • Restrict access to WordPress form submission endpoints via your web server or WAF if the plugin must remain active.
  • Enable a Web Application Firewall (WAF) with XSS detection rules (e.g., Cloudflare, Sucuri, or WordFence).

Detection

WordPress administrators can check for indicators of compromise by:

  • Reviewing the WordPress database's wp_options and wp_posts tables for unexpected <script> tags in stored content.
  • Auditing server logs for unusual POST requests to Brizy form endpoints from unexpected IP addresses.
  • Using a WordPress security scanner (e.g., Wordfence, MalCare) to scan for injected malicious code.

References

  • NVD Entry: CVE-2026-5324
  • WordPress Plugin Repository: Brizy – Page Builder
  • OWASP: Stored Cross-Site Scripting
#CVE#WordPress#XSS#NVD#Vulnerability#Web Security

Related Articles

CVE-2015-20118: Stored XSS in RealtyScript 4.0.2 Admin Interface

A stored cross-site scripting vulnerability in RealtyScript 4.0.2 allows attackers to inject malicious JavaScript via the location_name parameter in the...

4 min read

CVE-2026-6785: Memory Safety Bugs in Firefox and Thunderbird Enable Arbitrary Code Execution

A CVSS 8.1 high-severity collection of memory safety bugs affects Firefox 149, Firefox ESR 140.9, Firefox ESR 115.34, Thunderbird 149, and Thunderbird ESR 140.9. Evidence of memory corruption was found; exploitation could lead to arbitrary code execution. Patched in Firefox 150 released April 21, 2026.

5 min read

CVE-2026-7037: Unauthenticated OS Command Injection in Totolink A8000RU

A critical CVSS 9.8 OS command injection vulnerability in the Totolink A8000RU router allows unauthenticated remote attackers to execute arbitrary commands via the pptpPassThru parameter in the CGI handler. No patch available.

4 min read
Back to all Security Alerts