The GutenGeek Free Gutenberg Blocks for WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 1.1.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file.
Metrics
Affected Vendors & Products
References
History
Wed, 02 Oct 2024 20:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Gutengeek
Gutengeek free Gutenberg Blocks |
|
CPEs | cpe:2.3:a:gutengeek:free_gutenberg_blocks:*:*:*:*:*:wordpress:*:* | |
Vendors & Products |
Gutengeek
Gutengeek free Gutenberg Blocks |
Wed, 25 Sep 2024 14:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Wpopal
Wpopal gutengeek Free Gutenberg Blocks For Wordpress |
|
CPEs | cpe:2.3:a:wpopal:gutengeek_free_gutenberg_blocks_for_wordpress:*:*:*:*:*:*:*:* | |
Vendors & Products |
Wpopal
Wpopal gutengeek Free Gutenberg Blocks For Wordpress |
|
Metrics |
ssvc
|
Wed, 25 Sep 2024 02:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The GutenGeek Free Gutenberg Blocks for WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 1.1.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file. | |
Title | GutenGeek Free Gutenberg Blocks for WordPress <= 1.1.3 - Authenticated (Author+) Stored Cross-Site Scripting via SVG File Upload | |
Weaknesses | CWE-79 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2024-09-25T13:41:00.952Z
Reserved: 2024-09-21T00:30:24.614Z
Link: CVE-2024-9073

Updated: 2024-09-25T13:39:55.406Z

Status : Analyzed
Published: 2024-09-25T03:15:07.213
Modified: 2024-10-02T19:32:43.047
Link: CVE-2024-9073

No data.