First published: Tue Jun 04 2024(Updated: )
The Gutenberg Blocks with AI by Kadence WP WordPress plugin before 3.2.37 does not validate and escape some of its block attributes before outputting them back in a page/post where the block is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks
Credit: contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
WordPress Kadence Blocks | <3.2.37 | |
KadenceWP Gutenberg Blocks with AI | <3.2.37 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-4057 is considered to be a moderate severity vulnerability due to its potential for Stored Cross-Site Scripting attacks.
The impact of CVE-2024-4057 allows users with the contributor role and above to inject malicious scripts through unvalidated block attributes.
To fix CVE-2024-4057, ensure that the Kadence WP Gutenberg Blocks with AI plugin is updated to version 3.2.37 or later.
Users of the Kadence WP Gutenberg Blocks with AI plugin versions prior to 3.2.37 are affected by CVE-2024-4057.
Versions of the Kadence WP Gutenberg Blocks with AI plugin before 3.2.37 are vulnerable to CVE-2024-4057.