The Essential Blocks WordPress plugin before 4.7.0 does not validate and escape some of its block options before outputting them back in a page/post where the block is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks
[
{
"cpes": [
"cpe:2.3:a:wpdeveloper:essential_blocks:*:*:*:*:*:wordpress:*:*"
],
"vendor": "wpdeveloper",
"product": "essential_blocks",
"versions": [
{
"status": "affected",
"version": "0",
"lessThan": "4.7.0",
"versionType": "custom"
}
],
"defaultStatus": "unknown"
}
]