The BlockMeister – Block Pattern Builder plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 3.1.10. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Metrics
Affected Vendors & Products
References
History
Fri, 11 Oct 2024 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 11 Oct 2024 07:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The BlockMeister – Block Pattern Builder plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 3.1.10. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. | |
Title | BlockMeister – Block Pattern Builder <= 3.1.10 - Reflected Cross-Site Scripting | |
Weaknesses | CWE-79 | |
References |
|
|
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: Wordfence
Published: 2024-10-11T06:50:16.684Z
Updated: 2024-10-11T13:43:34.109Z
Reserved: 2024-10-07T22:38:41.045Z
Link: CVE-2024-9616
Vulnrichment
Updated: 2024-10-11T13:43:29.625Z
NVD
Status : Awaiting Analysis
Published: 2024-10-11T13:15:20.703
Modified: 2024-10-15T12:58:51.050
Link: CVE-2024-9616
Redhat
No data.