The Gutenberg Blocks by Kadence Blocks WordPress plugin before 3.2.26 does not validate and escape some of its block options before outputting them back in a page/post where the block is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks
References
| Link | Resource |
|---|---|
| https://research.cleantalk.org/cve-2024-2509/ | Exploit Third Party Advisory |
| https://wpscan.com/vulnerability/dec4a632-e04b-4fdd-86e4-48304b892a4f/ | Exploit Third Party Advisory |
| https://research.cleantalk.org/cve-2024-2509/ | Exploit Third Party Advisory |
| https://wpscan.com/vulnerability/dec4a632-e04b-4fdd-86e4-48304b892a4f/ | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2024-04-05 05:15
Updated : 2025-05-13 00:41
NVD link : CVE-2024-2509
Mitre link : CVE-2024-2509
CVE.ORG link : CVE-2024-2509
JSON object : View
Products Affected
kadencewp
- gutenberg_blocks_with_ai
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
