1 results (0.001 seconds)

CVSS: 6.4EPSS: 0%CPEs: 1EXPL: 2

The Otter Blocks WordPress plugin before 2.6.6 does not properly escape its mainHeadings blocks' attribute before appending it to the final rendered block, allowing contributors to conduct Stored XSS attacks. El complemento Otter Blocks de WordPress anterior a 2.6.6 no escapa correctamente del atributo de sus bloques mainHeadings antes de agregarlo al bloque renderizado final, lo que permite a los contribuyentes realizar ataques XSS almacenados. The Otter Blocks – Gutenberg Blocks, Page Builder for Gutenberg Editor & FSE plugin for WordPress is vulnerable to Stored Cross-Site Scripting via new post creation in all versions up to, and including, 2.6.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. • https://github.com/th3gokul/CVE-2024-27292 https://wpscan.com/vulnerability/5014f886-020e-49d1-96a5-2159eed8ba14 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •