First published: Wed Jan 08 2025(Updated: )
The Essential Blocks – Page Builder Gutenberg Blocks, Patterns & Templates plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the maker title value of the Google Maps block in all versions up to, and including, 5.0.9 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level access, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
WPDeveloper Essential Blocks for Gutenberg | <=5.0.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-12045 has a severity rating that indicates significant potential risk due to Stored Cross-Site Scripting vulnerabilities.
To mitigate CVE-2024-12045, update the Essential Blocks plugin for WordPress to version 5.1.0 or higher.
CVE-2024-12045 could allow attackers to execute arbitrary JavaScript in the context of the website, potentially compromising user data.
CVE-2024-12045 impacts all versions of the Essential Blocks plugin for WordPress up to and including 5.0.9.
CVE-2024-12045 occurs due to insufficient input sanitization in the maker title value of the Google Maps block in the affected versions.