Description
The BlockArt Blocks – Gutenberg Blocks, Page Builder Blocks ,WordPress Block Plugin, Sections & Template Library plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘timestamp’ attribute in all versions up to, and including, 2.2.13 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: 2025-12-02
Score: 6.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting
Action: Patch
AI Analysis

Impact

The BlockArt Blocks plugin is vulnerable to stored XSS because the ‘timestamp’ attribute is not properly sanitized or escaped. When a contributor or higher level user submits a payload via this field, it is written to the database and later rendered unchanged on any page that includes the block. An attacker can thus inject arbitrary JavaScript that executes in the browsers of all visitors who view the affected page, potentially allowing session hijacking, credential theft, defacement, or further malicious activity.

Affected Systems

All users of the BlockArt Blocks – Gutenberg Blocks, Page Builder Blocks, WordPress Block Plugin, Sections & Template Library plugin for WordPress with versions 2.2.13 or earlier are affected. No more recent versions are listed as vulnerable; the issue exists in every release up to and including 2.2.13.

Risk and Exploitability

With a CVSS score of 6.4 the vulnerability is considered moderate. The EPSS score is below 1 %, indicating a very low likelihood of exploitation. It is not included in the CISA KEV catalog. Exploitation requires a valid contributor‑level or higher account to inject the payload, and the injected code will run whenever any user loads the affected page. Based on the data, these conditions make the vulnerability modestly serious but unlikely to be actively exploited in the near term.

Generated by OpenCVE AI on April 21, 2026 at 01:13 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the BlockArt Blocks plugin to the latest available version (2.2.14 or newer) that removes unsanitised handling of the timestamp attribute.
  • If an upgrade is temporarily infeasible, eliminate the use of the timestamp attribute by either removing the block from pages or editing the plugin’s source to hard‑code a safe value and restrict edit capabilities to trusted users only.
  • Deploy a Web Application Firewall rule that detects suspicious script payloads inserted into the timestamp field and blocks or sanitises such content before it reaches the database.

Generated by OpenCVE AI on April 21, 2026 at 01:13 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 02 Dec 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 02 Dec 2025 12:30:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Wpblockart
Wpblockart blockart Blocks
Vendors & Products Wordpress
Wordpress wordpress
Wpblockart
Wpblockart blockart Blocks

Tue, 02 Dec 2025 02:30:00 +0000

Type Values Removed Values Added
Description The BlockArt Blocks – Gutenberg Blocks, Page Builder Blocks ,WordPress Block Plugin, Sections & Template Library plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘timestamp’ attribute in all versions up to, and including, 2.2.13 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Title BlockArt Blocks – Gutenberg Blocks, Page Builder Blocks ,WordPress Block Plugin, Sections & Template Library <= 2.2.13 - Authenticated (Contributor+) Stored Cross-Site Scripting via `timestamp` Attribute
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Wordpress Wordpress
Wpblockart Blockart Blocks
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:17:56.011Z

Reserved: 2025-11-25T21:15:15.664Z

Link: CVE-2025-13697

cve-icon Vulnrichment

Updated: 2025-12-02T16:50:37.827Z

cve-icon NVD

Status : Deferred

Published: 2025-12-02T03:16:15.873

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-13697

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T01:15:20Z

Weaknesses