The Essential Blocks – Page Builder Gutenberg Blocks, Patterns & Templates plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘tagName’ parameter in versions up to, and including, 4.5.12 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Metrics
Affected Vendors & Products
References
History
Thu, 30 Jan 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wpdeveloper
Wpdeveloper essential Blocks |
|
| Weaknesses | CWE-79 | |
| CPEs | cpe:2.3:a:wpdeveloper:essential_blocks:*:*:*:*:free:wordpress:*:* | |
| Vendors & Products |
Wpdeveloper
Wpdeveloper essential Blocks |
Status: PUBLISHED
Assigner: Wordfence
Published: 2024-05-18T04:30:53.061Z
Updated: 2024-08-01T20:55:10.248Z
Reserved: 2024-05-15T00:10:22.944Z
Link: CVE-2024-4891
Updated: 2024-08-01T20:55:10.248Z
Status : Analyzed
Published: 2024-05-18T05:15:46.917
Modified: 2025-01-30T15:45:34.377
Link: CVE-2024-4891
No data.