Description

The Gutenberg Blocks with AI by Kadence WP Page Builder Features plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the titleFont parameter in all versions up to, and including, 3.2.38 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

Classification

Assigner:

CWE:

Links
CPEs
  • kadence_wp gutenberg_blocks_with_ai_page_builder_features 3.2.38

CVSS

CVSS version: 3.1 Base score: 6.4
Base severity: MEDIUM Vector: AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
Exploitability score: 3.1 Impact score: 2.7

Can you explain the CVE description?

This CVE description is about a vulnerability in the Gutenberg Blocks with AI by Kadence WP Page Builder Features plugin for WordPress. The vulnerability is a Stored Cross-Site Scripting issue that exists in all versions up to and including 3.2.38 of the plugin. This vulnerability is due to insufficient input sanitization and output escaping, allowing authenticated attackers with Contributor-level access and above to inject arbitrary web scripts into pages. These injected scripts will execute whenever a user accesses the affected page. The CVSS score for this vulnerability is 6.4, which is considered medium severity. The vector CVSS shows that the attack complexity is low, the privileges required are low, and the impact is confidentiality, integrity, and availability being affected. The exploitability score is 3.1, and the impact score is 2.7. There are several URLs provided in the description for further reference and information about the vulnerability. The status of this CVE is EARLY_WARNING, and it was published on June 14, 2024. The last modified date is also June 14, 2024. The CVE identifier for this vulnerability is CVE-2024-4863.

How can this vulnerability be part of an attack tree?

This vulnerability can be part of an attack tree by allowing authenticated attackers with Contributor-level access and above to inject arbitrary web scripts into pages using the Gutenberg Blocks with AI by Kadence WP Page Builder Features plugin for WordPress. These injected scripts can then be used to steal sensitive information from users, perform actions on behalf of the user, or redirect users to malicious websites. The attack tree could include steps such as: 1. Attacker gains Contributor-level access or above to the WordPress site. 2. Attacker identifies a page or post where they can inject malicious scripts via the titleFont parameter. 3. Attacker injects the malicious script, which is stored in the database. 4. When a user accesses the injected page, the malicious script is executed, potentially leading to further exploitation or compromise of the users system. By exploiting this vulnerability, an attacker could potentially compromise the security and integrity of the WordPress site and its users, leading to various malicious activities.


Generated on: 2024-07-01