Vulnerability Description
The Gutenverse WordPress plugin before 1.9.1 does not validate the htmlTag option in various of its block before outputting it back in a page/post where the block is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Jegstudio | Gutenverse | < 1.9.1 |
Related Weaknesses (CWE)
References
- https://wpscan.com/vulnerability/6f100f85-3a76-44be-8092-06eb8595b0c9/ExploitThird Party Advisory
- https://wpscan.com/vulnerability/6f100f85-3a76-44be-8092-06eb8595b0c9/ExploitThird Party Advisory
FAQ
What is CVE-2024-3692?
CVE-2024-3692 is a vulnerability with a CVSS score of 6.1 (MEDIUM). The Gutenverse WordPress plugin before 1.9.1 does not validate the htmlTag option in various of its block before outputting it back in a page/post where the block is embed, which could allow users wi...
How severe is CVE-2024-3692?
CVE-2024-3692 has been rated MEDIUM with a CVSS base score of 6.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-3692?
Check the references section above for vendor advisories and patch information. Affected products include: Jegstudio Gutenverse.