Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 27 May 2025 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-79 | |
| CPEs | cpe:2.3:a:kadencewp:gutenberg_blocks_with_ai:*:*:*:*:*:wordpress:*:* |
Thu, 08 Aug 2024 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Kadencewp
Kadencewp gutenberg Blocks With Ai |
|
| CPEs | cpe:2.3:a:kadencewp:gutenberg_blocks_with_ai:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Kadencewp
Kadencewp gutenberg Blocks With Ai |
|
| Metrics |
cvssV3_1
|
Thu, 08 Aug 2024 06:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Gutenberg Blocks with AI by Kadence WP WordPress plugin before 3.2.39 does not validate and escape some of its block options before outputting them back in a page/post where the block is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks | |
| Title | Gutenberg Blocks with AI by Kadence WP < 3.2.39 - Contributor+ Stored XSS | |
| References |
|
Status: PUBLISHED
Assigner: WPScan
Published:
Updated: 2024-08-08T18:27:36.888Z
Reserved: 2024-07-18T14:43:21.457Z
Link: CVE-2024-6884
Updated: 2024-08-08T18:27:30.193Z
Status : Analyzed
Published: 2024-08-08T06:15:41.603
Modified: 2025-05-27T21:11:01.380
Link: CVE-2024-6884
No data.
OpenCVE Enrichment
No data.