The Post Grid Gutenberg Blocks and WordPress Blog Plugin WordPress plugin before 4.0.2 does not validate and escape some of its block options before outputting them back in a page/post where the block is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/dfa1421b-41b0-4b25-95ef-0843103e1f5e/ | Exploit Third Party Advisory |
https://wpscan.com/vulnerability/dfa1421b-41b0-4b25-95ef-0843103e1f5e/ | Exploit Third Party Advisory |
Configurations
History
14 May 2025, 17:14
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:wpxpo:postx:*:*:*:*:*:wordpress:*:* | |
CWE | CWE-79 | |
First Time |
Wpxpo
Wpxpo postx |
|
References | () https://wpscan.com/vulnerability/dfa1421b-41b0-4b25-95ef-0843103e1f5e/ - Exploit, Third Party Advisory |
Information
Published : 2024-05-14 15:40
Updated : 2025-05-14 17:14
NVD link : CVE-2024-3239
Mitre link : CVE-2024-3239
CVE.ORG link : CVE-2024-3239
JSON object : View
Products Affected
wpxpo
- postx
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')