Description
The Essential Blocks WordPress plugin before 4.7.0 does not validate and escape some of its block options before outputting them back in a page/post where the block is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
No advisories yet.
References
History
Fri, 11 Apr 2025 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-79 | |
| CPEs | cpe:2.3:a:wpdeveloper:essential_blocks:*:*:*:*:free:wordpress:*:* |
Status: PUBLISHED
Assigner: WPScan
Published:
Updated: 2024-08-02T16:12:09.234Z
Reserved: 2024-06-03T08:54:49.037Z
Link: CVE-2024-5595
Updated: 2024-08-02T16:11:51.471Z
Status : Analyzed
Published: 2024-08-02T06:15:54.263
Modified: 2025-04-11T15:14:03.770
Link: CVE-2024-5595
No data.
OpenCVE Enrichment
No data.
Weaknesses