Lucene search

K

6 matches found

CVE
CVE
added 2024/01/16 4:15 p.m.62 views

CVE-2023-0376

The Qubely WordPress plugin before 1.8.5 does not validate and escape some of its block options before outputting them back in a page/post where the block is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.

5.4CVSS5.3AI score0.00229EPSS
CVE
CVE
added 2025/02/16 11:15 p.m.51 views

CVE-2025-26767

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Themeum Qubely – Advanced Gutenberg Blocks allows Stored XSS. This issue affects Qubely – Advanced Gutenberg Blocks: from n/a through 1.8.12.

6.5CVSS7AI score0.00034EPSS
CVE
CVE
added 2025/03/11 7:15 a.m.47 views

CVE-2024-13228

The Qubely – Advanced Gutenberg Blocks plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.8.13 via the 'qubely_get_content'. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract sensitive pr...

6.5CVSS6.7AI score0.00063EPSS
CVE
CVE
added 2022/01/24 8:15 a.m.41 views

CVE-2021-25013

The Qubely WordPress plugin before 1.7.8 does not have authorisation and CSRF check on the qubely_delete_saved_block AJAX action, and does not ensure that the block to be deleted belong to the plugin, as a result, any authenticated users, such as subscriber can delete arbitrary posts

6.5CVSS6.4AI score0.00135EPSS
CVE
CVE
added 2025/02/14 7:15 a.m.38 views

CVE-2024-9601

The Qubely – Advanced Gutenberg Blocks plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘align’ and 'UniqueID' parameter in all versions up to, and including, 1.8.12 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attacke...

6.5CVSS5.8AI score0.00043EPSS
CVE
CVE
added 2023/08/07 3:15 p.m.28 views

CVE-2021-24916

The Qubely WordPress plugin before 1.8.6 allows unauthenticated user to send arbitrary e-mails to arbitrary addresses via the qubely_send_form_data AJAX action.

7.5CVSS7.6AI score0.03348EPSS