First published: Fri Dec 13 2024(Updated: )
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in RadiusTheme Radius Blocks – WordPress Gutenberg Blocks allows Stored XSS.This issue affects Radius Blocks – WordPress Gutenberg Blocks: from n/a through 2.1.2.
Credit: audit@patchstack.com
Affected Software | Affected Version | How to fix |
---|---|---|
RadiusTheme Radius Blocks | <=2.1.2 | |
RadiusTheme Radius Blocks | <=2.1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-54272 is classified as high due to the potential for stored cross-site scripting (XSS) attacks.
To fix CVE-2024-54272, update the Radius Blocks – WordPress Gutenberg Blocks plugin to version 2.1.3 or later.
CVE-2024-54272 affects Radius Blocks versions from n/a up to and including 2.1.2.
The impact of CVE-2024-54272 is the potential for attackers to execute arbitrary scripts in the context of the user’s session.
CVE-2024-54272 specifically affects the Radius Blocks plugin used within WordPress.