First published: Thu Aug 08 2024(Updated: )
The Gutenberg Blocks with AI by Kadence WP WordPress plugin before 3.2.39 does not validate and escape some of its block options before outputting them back in a page/post where the block is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks
Credit: contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
KadenceWP Gutenberg Blocks with AI | <3.2.39 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-6884 has a severity rating that indicates a significant risk for users, specifically related to Stored Cross-Site Scripting (XSS).
To fix CVE-2024-6884, update the Kadence WP Gutenberg Blocks with AI plugin to version 3.2.39 or later.
CVE-2024-6884 affects users of the Kadence WP Gutenberg Blocks with AI plugin prior to version 3.2.39, particularly those with contributor roles and above.
CVE-2024-6884 is classified as a Stored Cross-Site Scripting (XSS) vulnerability.
Users with affected versions should immediately update their plugin to version 3.2.39 or higher to mitigate the risk associated with CVE-2024-6884.