Reflected XSS Vulnerability in The Plus Blocks for Block Editor | Gutenberg
CVE-2024-30435

7.1HIGH

Key Information:

Vendor
WordPress
Vendor
CVE Published:
29 March 2024

Summary

The Plus Blocks for Block Editor | Gutenberg, developed by POSIMYTH, is affected by a reflected cross-site scripting (XSS) vulnerability that arises from improper neutralization of input during web page generation. This weakness allows malicious users to manipulate web content, potentially leading to unauthorized access to sensitive user data. The vulnerability impacts various versions of the plugin, including those prior to 3.2.5, underscoring the necessity for users to update to secure versions to mitigate risks. Proper input validation and sanitization practices are essential for safeguarding applications against such attacks.

Affected Version(s)

The Plus Blocks for Block Editor | Gutenberg <= 3.2.5

References

CVSS V3.1

Score:
7.1
Severity:
HIGH
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Changed

Timeline

  • Vulnerability published

Credit

LVT-tholv2k (Patchstack Alliance)
.