All the vulnerabilites related to Unknown - Page Builder Gutenberg Blocks
cve-2024-7132
Vulnerability from cvelistv5
Published
2024-08-29 06:00
Modified
2024-08-29 13:57
Severity ?
EPSS score ?
Summary
CoBlocks < 3.1.13 - Editor+ Stored XSS
References
▼ | URL | Tags |
---|---|---|
https://wpscan.com/vulnerability/16deb743-6fe9-43a2-9586-d92cfe1daa17/ | exploit, vdb-entry, technical-description |
Impacted products
▼ | Vendor | Product |
---|---|---|
Unknown | Page Builder Gutenberg Blocks |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:gutentor:gutenberg_blocks:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "gutenberg_blocks", "vendor": "gutentor", "versions": [ { "lessThan": "3.1.13", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-7132", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-29T13:33:26.322745Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-29T13:57:12.080Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Page Builder Gutenberg Blocks", "vendor": "Unknown", "versions": [ { "lessThan": "3.1.13", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Dmitrii Ignatyev" }, { "lang": "en", "type": "coordinator", "value": "WPScan" } ], "descriptions": [ { "lang": "en", "value": "The Page Builder Gutenberg Blocks WordPress plugin before 3.1.13 does not escape the content of post embed via one of its block, which could allow users with the capability to publish posts (editor and admin by default) to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)" } ], "problemTypes": [ { "descriptions": [ { "description": "CWE-79 Cross-Site Scripting (XSS)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-29T06:00:03.395Z", "orgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "shortName": "WPScan" }, "references": [ { "tags": [ "exploit", "vdb-entry", "technical-description" ], "url": "https://wpscan.com/vulnerability/16deb743-6fe9-43a2-9586-d92cfe1daa17/" } ], "source": { "discovery": "EXTERNAL" }, "title": "CoBlocks \u003c 3.1.13 - Editor+ Stored XSS", "x_generator": { "engine": "WPScan CVE Generator" } } }, "cveMetadata": { "assignerOrgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "assignerShortName": "WPScan", "cveId": "CVE-2024-7132", "datePublished": "2024-08-29T06:00:03.395Z", "dateReserved": "2024-07-26T15:36:13.583Z", "dateUpdated": "2024-08-29T13:57:12.080Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-4260
Vulnerability from cvelistv5
Published
2024-07-23 06:00
Modified
2024-08-01 20:33
Severity ?
EPSS score ?
Summary
CoBlocks < 3.1.12 - Contributor+ SSRF
References
▼ | URL | Tags |
---|---|---|
https://wpscan.com/vulnerability/69f33e20-8ff4-491c-8f37-a4eadd4ea8cf/ | exploit, vdb-entry, technical-description |
Impacted products
▼ | Vendor | Product |
---|---|---|
Unknown | Page Builder Gutenberg Blocks |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:page_builder_gutenberg_blocks:page_builder_gutenberg_blocks:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "page_builder_gutenberg_blocks", "vendor": "page_builder_gutenberg_blocks", "versions": [ { "lessThan": "3.1.12", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-4260", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-07-23T13:04:11.846134Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-23T13:07:40.802Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T20:33:52.992Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "exploit", "vdb-entry", "technical-description", "x_transferred" ], "url": "https://wpscan.com/vulnerability/69f33e20-8ff4-491c-8f37-a4eadd4ea8cf/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Page Builder Gutenberg Blocks ", "vendor": "Unknown", "versions": [ { "lessThan": "3.1.12", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Dmitrii Ignatyev" }, { "lang": "en", "type": "coordinator", "value": "WPScan" } ], "descriptions": [ { "lang": "en", "value": "The Page Builder Gutenberg Blocks WordPress plugin before 3.1.12 does not prevent users from pinging arbitrary hosts via some of its shortcodes, which could allow high privilege users such as contributors to perform SSRF attacks." } ], "problemTypes": [ { "descriptions": [ { "description": "CWE-918 Server-Side Request Forgery (SSRF)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-23T06:00:02.295Z", "orgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "shortName": "WPScan" }, "references": [ { "tags": [ "exploit", "vdb-entry", "technical-description" ], "url": "https://wpscan.com/vulnerability/69f33e20-8ff4-491c-8f37-a4eadd4ea8cf/" } ], "source": { "discovery": "EXTERNAL" }, "title": "CoBlocks \u003c 3.1.12 - Contributor+ SSRF", "x_generator": { "engine": "WPScan CVE Generator" } } }, "cveMetadata": { "assignerOrgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "assignerShortName": "WPScan", "cveId": "CVE-2024-4260", "datePublished": "2024-07-23T06:00:02.295Z", "dateReserved": "2024-04-26T14:47:07.157Z", "dateUpdated": "2024-08-01T20:33:52.992Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-2369
Vulnerability from cvelistv5
Published
2024-04-02 05:00
Modified
2024-10-31 15:21
Severity ?
EPSS score ?
Summary
Page Builder Gutenberg Blocks < 3.1.7 - Contributor+ Stored XSS
References
▼ | URL | Tags |
---|---|---|
https://wpscan.com/vulnerability/252dfc35-4c8c-4304-aa09-73dfe986b10d/ | exploit, vdb-entry, technical-description |
Impacted products
▼ | Vendor | Product |
---|---|---|
Unknown | Page Builder Gutenberg Blocks |
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-2369", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-04-09T14:08:41.650469Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-31T15:21:50.437Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T19:11:53.453Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "exploit", "vdb-entry", "technical-description", "x_transferred" ], "url": "https://wpscan.com/vulnerability/252dfc35-4c8c-4304-aa09-73dfe986b10d/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "collectionURL": "https://wordpress.org/plugins", "defaultStatus": "unaffected", "product": "Page Builder Gutenberg Blocks", "vendor": "Unknown", "versions": [ { "lessThan": "3.1.7", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Dmitrii Ignatyev" }, { "lang": "en", "type": "coordinator", "value": "WPScan" } ], "descriptions": [ { "lang": "en", "value": "The Page Builder Gutenberg Blocks WordPress plugin before 3.1.7 does not validate and escape some of its block options before outputting them back in a page/post where the block is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks" } ], "problemTypes": [ { "descriptions": [ { "description": "CWE-79 Cross-Site Scripting (XSS)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-08T17:28:06.128Z", "orgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "shortName": "WPScan" }, "references": [ { "tags": [ "exploit", "vdb-entry", "technical-description" ], "url": "https://wpscan.com/vulnerability/252dfc35-4c8c-4304-aa09-73dfe986b10d/" } ], "source": { "discovery": "EXTERNAL" }, "title": "Page Builder Gutenberg Blocks \u003c 3.1.7 - Contributor+ Stored XSS", "x_generator": { "engine": "WPScan CVE Generator" } } }, "cveMetadata": { "assignerOrgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "assignerShortName": "WPScan", "cveId": "CVE-2024-2369", "datePublished": "2024-04-02T05:00:01.384Z", "dateReserved": "2024-03-11T09:38:26.146Z", "dateUpdated": "2024-10-31T15:21:50.437Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }