Description
The Rise Blocks – A Complete Gutenberg Page Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the titleTag parameter in all versions up to, and including, 3.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: 2025-02-12
Score: 6.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Cross‑Site Scripting (Authenticated)
Action: Immediate Patch
AI Analysis

Impact

The Rise Blocks – A Complete Gutenberg Page Builder plugin for WordPress contains a stored cross‑site scripting flaw in the titleTag parameter. The plugin fails to properly sanitize or escape the value supplied by users with Contributor or higher privileges, enabling them to inject arbitrary JavaScript that executes whenever a page containing the injected block is loaded. Once injected, the script runs in the browser context of every visitor to that page, potentially leading to session hijacking, credential theft, phishing, or site defacement.

Affected Systems

Any WordPress installation that uses the Rise Blocks – A Complete Gutenberg Page Builder plugin of version 3.6 or earlier is affected. The vulnerability applies to all releases through 3.6 as identified by the vendor and confirmed by source code references. No specific sub‑release information is available beyond that the flaw exists up to and including 3.6.

Risk and Exploitability

The CVSS score of 6.4 indicates moderate severity, but the EPSS score of less than 1% suggests a low likelihood of exploitation in the wild. The flaw requires an authenticated user with at least Contributor role, meaning the attacker must first compromise valid credentials or abuse an existing account with sufficient privileges. Because the vulnerability is stored, a single injection can affect all site visitors until the content is cleaned or the plugin is updated. The flaw is not listed in the CISA KEV catalog, so it has not been observed in large‑scale exploitation campaigns as of now.

Generated by OpenCVE AI on April 28, 2026 at 03:41 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Rise Blocks plugin to the latest published version (3.7 or newer) to remove the vulnerable titleTag handling code.
  • If an immediate upgrade is not possible, restrict or remove the titleTag parameter by disabling the site‑identity block for non‑administrator roles, or revoke Contributor role from users who do not require editing capability.
  • As a temporary workaround, replace the default input processing with proper sanitization, e.g. apply `sanitize_text_field` or `wp_kses_post` to the titleTag value before saving it to the database.

Generated by OpenCVE AI on April 28, 2026 at 03:41 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-1724 The Rise Blocks – A Complete Gutenberg Page Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the titleTag parameter in all versions up to, and including, 3.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
History

Wed, 08 Apr 2026 17:00:00 +0000


Sat, 12 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00022}

epss

{'score': 0.00024}


Fri, 11 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00049}

epss

{'score': 0.00022}


Tue, 25 Feb 2025 20:00:00 +0000

Type Values Removed Values Added
First Time appeared Eaglevisionit
Eaglevisionit rise Blocks
CPEs cpe:2.3:a:eaglevisionit:rise_blocks:*:*:*:*:*:wordpress:*:*
Vendors & Products Eaglevisionit
Eaglevisionit rise Blocks

Wed, 12 Feb 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 12 Feb 2025 09:30:00 +0000

Type Values Removed Values Added
Description The Rise Blocks – A Complete Gutenberg Page Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the titleTag parameter in all versions up to, and including, 3.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Title Rise Blocks – A Complete Gutenberg Page Builder <= 3.6 - Authenticated (Contributor+) Stored Cross-Site Scripting via TitleTag Parameter
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Eaglevisionit Rise Blocks
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:44:30.249Z

Reserved: 2025-01-15T20:03:39.209Z

Link: CVE-2025-0506

cve-icon Vulnrichment

Updated: 2025-02-12T14:39:58.966Z

cve-icon NVD

Status : Modified

Published: 2025-02-12T10:15:14.360

Modified: 2026-04-08T17:19:53.067

Link: CVE-2025-0506

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T03:45:20Z

Weaknesses