Description
The Progress Bar Blocks for Gutenberg plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 1.0.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file.
Published: 2025-11-11
Score: 5.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross-Site Scripting
Action: Patch
AI Analysis

Impact

The Progress Bar Blocks for Gutenberg plugin is affected by a stored Cross-Site Scripting vulnerability that can be exploited when an SVG file is uploaded. Authenticated users with Author-level access or higher can embed malicious scripts that will execute in the browsers of any user who views the SVG file, potentially compromising user sessions and accessing sensitive data. The flaw stems from insufficient input sanitization and improper output escaping when handling SVG uploads, allowing arbitrary script injection.

Affected Systems

The vulnerability impacts the WordPress plugin Progress Bar Blocks for Gutenberg from vendor jobayer534. All releases up through and including version 1.0.0 are affected; no later versions are disclosed as vulnerable.

Risk and Exploitability

The CVSS score of 5.4 indicates moderate severity, while the EPSS score of less than 1 % shows a low probability of exploitation. The flaw is not listed in the CISA KEV catalog, suggesting it is not a known widely exploited issue. Attackers must hold at least Author‑level privileges within a WordPress site to upload the malicious SVG; exploitation is local to the authenticated user base and requires the plugin to be active. Proper mitigation is recommended to avoid the risk of arbitrary script execution on the site.

Generated by OpenCVE AI on April 21, 2026 at 18:32 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Progress Bar Blocks for Gutenberg plugin to a patched version (1.0.1 or newer) as soon as it is released.
  • If no patch is immediately available, disable the SVG upload capability within the plugin or restrict it so that only administrators can upload SVG files.
  • Configure a security plugin or WordPress rule to block or sanitise SVG file uploads from non‑admin users, ensuring that malicious script tags cannot be embedded.
  • Consider temporarily removing or deactivating the plugin until a fix is applied to eliminate the vulnerability entirely.

Generated by OpenCVE AI on April 21, 2026 at 18:32 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 12 Nov 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 12 Nov 2025 13:00:00 +0000

Type Values Removed Values Added
First Time appeared Jobayer534
Jobayer534 progress Bar Blocks For Gutenberg
Wordpress
Wordpress wordpress
Vendors & Products Jobayer534
Jobayer534 progress Bar Blocks For Gutenberg
Wordpress
Wordpress wordpress

Tue, 11 Nov 2025 03:45:00 +0000

Type Values Removed Values Added
Description The Progress Bar Blocks for Gutenberg plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 1.0.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file.
Title Progress Bar Blocks for Gutenberg <= 1.0.0 - Authenticated (Author+) Stored Cross-Site Scripting via SVG
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}


Subscriptions

Jobayer534 Progress Bar Blocks For Gutenberg
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:47:16.839Z

Reserved: 2025-11-07T16:10:05.480Z

Link: CVE-2025-12880

cve-icon Vulnrichment

Updated: 2025-11-12T16:34:47.554Z

cve-icon NVD

Status : Deferred

Published: 2025-11-11T04:15:50.580

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-12880

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T18:45:06Z

Weaknesses