First published: Sat Jun 01 2024(Updated: )
The Content Blocks (Custom Post Widget) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'content_block' shortcode in all versions up to, and including, 3.3.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
WordPress Content Blocks | <=3.3.0 | |
Johan van der Wijk Content Blocks | <3.3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-3565 is rated as a high severity vulnerability due to the potential for Stored Cross-Site Scripting.
To fix CVE-2024-3565, update the Content Blocks (Custom Post Widget) plugin to version 3.3.1 or later.
CVE-2024-3565 affects all versions of the Content Blocks (Custom Post Widget) plugin up to and including version 3.3.0.
CVE-2024-3565 is a Stored Cross-Site Scripting vulnerability caused by insufficient input sanitization.
The vendor for the affected software in CVE-2024-3565 is Johan van der Wijk.