The Gutentor WordPress plugin before 3.3.6 does not validate and escape some of its block options before outputting them back in a page/post where the block is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/fb7d6839-9ccb-4a0f-9dca-d6841f666a1b/ | Exploit Third Party Advisory |
Configurations
History
07 Oct 2024, 15:44
Type | Values Removed | Values Added |
---|---|---|
First Time |
Gutentor
Gutentor gutentor |
|
CPE | cpe:2.3:a:gutentor:gutentor:*:*:*:*:*:wordpress:*:* | |
References | () https://wpscan.com/vulnerability/fb7d6839-9ccb-4a0f-9dca-d6841f666a1b/ - Exploit, Third Party Advisory | |
CWE | CWE-79 | |
Summary |
|
29 Aug 2024, 20:37
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.4 |
29 Aug 2024, 11:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-08-29 11:15
Updated : 2024-10-07 15:44
NVD link : CVE-2024-5417
Mitre link : CVE-2024-5417
CVE.ORG link : CVE-2024-5417
JSON object : View
Products Affected
gutentor
- gutentor
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')