First published: Fri Dec 13 2024(Updated: )
The Gutenberg Blocks with AI by Kadence WP – Page Builder Features plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 3.2.53 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
KadenceWP Gutenberg Blocks with AI | <3.2.54 | |
Kadence Blocks | <=3.2.53 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-12581 is classified as a high severity vulnerability due to its potential for Stored Cross-Site Scripting.
To fix CVE-2024-12581, update the Kadence Blocks plugin to version 3.2.54 or later.
CVE-2024-12581 affects all versions of the Gutenberg Blocks with AI by Kadence WP plugin up to and including version 3.2.53.
The exploitation of CVE-2024-12581 can lead to unauthorized execution of scripts, potentially compromising site integrity and user data.
CVE-2024-12581 was reported in 2024 and affects various applications utilizing the compromised version of the plugin.