The Page Builder Gutenberg Blocks WordPress plugin before 3.1.13 does not escape the content of post embed via one of its block, which could allow users with the capability to publish posts (editor and admin by default) to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/16deb743-6fe9-43a2-9586-d92cfe1daa17/ | Exploit Third Party Advisory |
Configurations
History
07 Oct 2024, 15:44
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:godaddy:coblocks:*:*:*:*:*:wordpress:*:* | |
CWE | CWE-79 | |
References | () https://wpscan.com/vulnerability/16deb743-6fe9-43a2-9586-d92cfe1daa17/ - Exploit, Third Party Advisory | |
First Time |
Godaddy
Godaddy coblocks |
|
Summary |
|
29 Aug 2024, 20:37
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.8 |
29 Aug 2024, 11:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-08-29 11:15
Updated : 2024-10-07 15:44
NVD link : CVE-2024-7132
Mitre link : CVE-2024-7132
CVE.ORG link : CVE-2024-7132
JSON object : View
Products Affected
godaddy
- coblocks
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')