Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 07 May 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Kadencewp
Kadencewp gutenberg Blocks With Ai |
|
| Weaknesses | CWE-79 | |
| CPEs | cpe:2.3:a:kadencewp:gutenberg_blocks_with_ai:*:*:*:*:*:wordpress:*:* | |
| Vendors & Products |
Kadencewp
Kadencewp gutenberg Blocks With Ai |
Thu, 12 Dec 2024 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Thu, 12 Dec 2024 06:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Gutenberg Blocks with AI by Kadence WP WordPress plugin before 3.2.54 does not validate and escape some of its block options before outputting them back in a page/post where the block is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks. | |
| Title | Kadence Blocks < 3.2.54 - Admin+ Stored XSS | |
| References |
|
Status: PUBLISHED
Assigner: WPScan
Published:
Updated: 2024-12-12T18:46:30.219Z
Reserved: 2024-10-31T18:34:16.856Z
Link: CVE-2024-10637
Updated: 2024-12-12T18:46:24.889Z
Status : Analyzed
Published: 2024-12-12T06:15:20.840
Modified: 2025-05-07T13:19:33.350
Link: CVE-2024-10637
No data.
OpenCVE Enrichment
No data.