Description
The Gutenberg Blocks with AI by Kadence WP – Page Builder Features plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘redirectURL’ parameter in all versions up to, and including, 3.5.10 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: 2025-07-09
Score: 6.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting
Action: Immediate Patch
AI Analysis

Impact

The Kadence Blocks plugin allows stored cross‑site scripting through the redirectURL parameter because the input is not properly sanitized or escaped. An authenticated attacker with Contributor or higher role can inject arbitrary JavaScript that will execute whenever a visitor loads the affected page, potentially allowing data theft, session hijacking, or defacement of the site.

Affected Systems

WordPress sites running the Kadence Blocks – Page Builder Toolkit for Gutenberg Editor, for any version up to and including 3.5.10. This includes all installations that have incorporated the plugin into their page or block architecture.

Risk and Exploitability

The CVSS score of 6.4 indicates a moderate severity. The EPSS score of less than 1% suggests that exploitation is currently unlikely, and the vulnerability is not listed in CISA’s KEV catalog. Successful exploitation requires that the attacker be authenticated with at least Contributor privileges and that they are able to inject script via the redirectURL field, which then persists in the site’s content and is served to other visitors.

Generated by OpenCVE AI on April 20, 2026 at 22:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Kadence Blocks to the latest version that removes the redirectURL issue.
  • Disable or delete any countdown or block elements that expose the redirectURL parameter until the patch is applied.
  • Restrict Contributor and higher roles from editing blocks that use redirectURL, or enforce stricter role permissions on block editing to limit potential injection surfaces.

Generated by OpenCVE AI on April 20, 2026 at 22:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-20768 The Gutenberg Blocks with AI by Kadence WP – Page Builder Features plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘redirectURL’ parameter in all versions up to, and including, 3.5.10 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
History

Thu, 17 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
First Time appeared Kadencewp
Kadencewp gutenberg Blocks With Ai
CPEs cpe:2.3:a:kadencewp:gutenberg_blocks_with_ai:*:*:*:*:*:wordpress:*:*
Vendors & Products Kadencewp
Kadencewp gutenberg Blocks With Ai

Tue, 15 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00029}

epss

{'score': 0.00032}


Wed, 09 Jul 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 09 Jul 2025 02:00:00 +0000

Type Values Removed Values Added
Description The Gutenberg Blocks with AI by Kadence WP – Page Builder Features plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘redirectURL’ parameter in all versions up to, and including, 3.5.10 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Title Kadence Blocks – Gutenberg Blocks for Page Builder Features <= 3.5.10 - Authenticated (Contributor+) Stored Cross-Site Scripting via `redirectURL` Parameter
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Kadencewp Gutenberg Blocks With Ai
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:34:46.761Z

Reserved: 2025-06-04T13:10:33.373Z

Link: CVE-2025-5678

cve-icon Vulnrichment

Updated: 2025-07-09T16:59:34.405Z

cve-icon NVD

Status : Analyzed

Published: 2025-07-09T02:15:22.270

Modified: 2025-07-17T13:31:56.730

Link: CVE-2025-5678

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-20T22:30:19Z

Weaknesses