Lucene search

K
KadencewpGutenberg Blocks With Ai

6 matches found

CVE
CVE
added 2024/04/05 5:15 a.m.69 views

CVE-2024-2509

The Gutenberg Blocks by Kadence Blocks WordPress plugin before 3.2.26 does not validate and escape some of its block options before outputting them back in a page/post where the block is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attack...

6.5CVSS6.1AI score0.00157EPSS
CVE
CVE
added 2024/04/04 3:15 a.m.69 views

CVE-2024-2919

The Gutenberg Blocks by Kadence Blocks – Page Builder Features plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the CountUp Widget in all versions up to, and including, 3.2.31 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it ...

6.4CVSS6.1AI score0.00135EPSS
CVE
CVE
added 2024/04/09 7:15 p.m.58 views

CVE-2024-0598

The Gutenberg Blocks by Kadence Blocks – Page Builder Features plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the contact form message settings in all versions up to and including 3.2.17 due to insufficient input sanitization and output escaping. This makes it possible for au...

4.8CVSS7.7AI score0.00597EPSS
CVE
CVE
added 2024/04/02 7:15 p.m.57 views

CVE-2024-24888

Server-Side Request Forgery (SSRF) vulnerability in Kadence WP Gutenberg Blocks by Kadence Blocks.This issue affects Gutenberg Blocks by Kadence Blocks: from n/a through 3.2.25.

6.5CVSS6.8AI score0.00237EPSS
CVE
CVE
added 2024/04/09 7:15 p.m.49 views

CVE-2024-1999

The Gutenberg Blocks by Kadence Blocks – Page Builder Features plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Testimonial Widget's anchor style parameter in all versions up to, and including, 3.2.25 due to insufficient input sanitization and output escaping. This makes it...

6.4CVSS6.1AI score0.00183EPSS
CVE
CVE
added 2024/04/09 7:15 p.m.38 views

CVE-2023-6964

The Gutenberg Blocks by Kadence Blocks – Page Builder Features plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 3.1.26 via the 'kadence_import_get_new_connection_data' AJAX action. This makes it possible for authenticated attackers, with contri...

8.5CVSS6.4AI score0.00193EPSS