First published: Thu Apr 18 2024(Updated: )
The Otter Blocks WordPress plugin before 2.6.6 does not properly escape its mainHeadings blocks' attribute before appending it to the final rendered block, allowing contributors to conduct Stored XSS attacks.
Credit: contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
Otter Blocks | <2.6.6 | |
Otter Blocks | <2.6.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-2729 has been rated as a medium severity vulnerability due to potential Stored XSS attacks.
To fix CVE-2024-2729, update the Otter Blocks plugin to version 2.6.6 or later to ensure proper escaping of attributes.
Anyone using Otter Blocks WordPress plugin versions prior to 2.6.6 is affected by CVE-2024-2729.
CVE-2024-2729 is classified as a Stored Cross-Site Scripting (XSS) vulnerability.
The risks of CVE-2024-2729 include unauthorized access and potential data theft through the exploitation of Stored XSS attacks.