First published: Wed Feb 26 2025(Updated: )
The Essential Blocks – Page Builder Gutenberg Blocks, Patterns & Templates plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘data-marker’ parameter in all versions up to, and including, 5.2.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
WPDeveloper Essential Blocks for Gutenberg | <=5.2.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-13803 is considered high due to the risk of stored cross-site scripting attacks.
To fix CVE-2024-13803, update the Essential Blocks plugin to version 5.2.4 or later.
CVE-2024-13803 affects all versions of the Essential Blocks plugin up to and including version 5.2.3.
CVE-2024-13803 is a stored cross-site scripting vulnerability caused by insufficient input sanitization.
The vendor associated with CVE-2024-13803 is WPDeveloper, the developer of Essential Blocks.