First published: Fri May 24 2024(Updated: )
The Spectra – WordPress Gutenberg Blocks plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘block_id’ parameter in versions up to, and including, 2.13.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with author-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Brainstorm Force Spectra | <2.13.1 | |
Spectra WordPress Gutenberg Blocks | <=2.13.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-4366 has a high severity due to its exploitation potential for stored cross-site scripting attacks.
To fix CVE-2024-4366, update the Spectra WordPress Gutenberg Blocks plugin to version 2.13.1 or higher.
CVE-2024-4366 affects users of the Spectra WordPress Gutenberg Blocks plugin version 2.13.0 and earlier.
CVE-2024-4366 is a stored cross-site scripting vulnerability that allows attackers to inject malicious scripts.
Versions of the Spectra WordPress Gutenberg Blocks plugin up to and including 2.13.0 are vulnerable to CVE-2024-4366.