First published: Sat May 18 2024(Updated: )
The Essential Blocks – Page Builder Gutenberg Blocks, Patterns & Templates plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘tagName’ parameter in versions up to, and including, 4.5.12 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Essential Blocks | <4.5.13 | |
Essential Blocks for Gutenberg | <=4.5.12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-4891 is considered to have a high severity due to the potential for stored cross-site scripting attacks.
To fix CVE-2024-4891, update the Essential Blocks plugin to version 4.5.13 or later, which addresses the vulnerability.
CVE-2024-4891 affects versions of Essential Blocks up to and including 4.5.12.
CVE-2024-4891 is a stored cross-site scripting (XSS) vulnerability caused by insufficient input sanitization.
The vendor responsible for CVE-2024-4891 is WPDeveloper, the developer of the Essential Blocks plugin.