Input validation vulnerability in Bold Page Builder 5.1.2

Multiple add-ons for the website platform WordPress are at risk for a type of cyber attack called Stored Cross-Site Scripting. This is because the add-ons use a library called Magnific Popups (specifically version 1.1.0) which does not properly protect against harmful code that users can input. This means that someone with a certain level of access to the website (contributor or higher) could potentially insert their own malicious code into a page. This code would then be executed whenever someone visits that page, putting them at risk. The developers of Magnific Popups have fixed this issue in the latest version (1.2.0) by disabling certain fields from accepting HTML code by default.

Detected in:

Bold Page Builder fixed vulnerable versions: >= * <= 5.1.2
Happy Addons for Elementor fixed vulnerable versions: >= * <= 3.12.2
OceanWP fixed vulnerable versions: >= * <= 3.6.0
Photo Gallery, Images, Slider in Rbs Image Gallery fixed vulnerable versions: >= * <= 3.2.22
Supreme Modules Lite – Divi Theme, Extra Theme and Divi Builder fixed vulnerable versions: >= * <= 2.5.52

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.