Vulnerabilities and security researches foressential-blocks essential-blocks
Direction: ascendingEssential Blocks – Page Builder Gutenberg Blocks, Patterns & Templates # 0363ff3384ec03990bbda4e574d619ea16717f53
- CVE, Research URL
- Home page URL
-
Security reports for Essential Blocks – Page Builder Gutenberg Blocks, Patterns & Templates
- Date
- Jan 20, 2023
- Research Description
- Essential Blocks – Page Builder Gutenberg Blocks, Patterns & Templates [essential-blocks] < 3.8.6 WordPress Essential Blocks for Gutenberg Plugin <= 3.8.5 is vulnerable to Broken Access Control Update the WordPress Essential Blocks for Gutenberg plugin to the latest available version (at least 3.8.6). Lucio Sá discovered and reported this Broken Access Control vulnerability in WordPress Essential Blocks for Gutenberg Plugin. This vulnerability has been fixed in version 3.8.6.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Essential Blocks – Page Builder Gutenberg Blocks, Patterns & Templates # CVE-2023-2084
- CVE, Research URL
- Home page URL
-
Security reports for Essential Blocks – Page Builder Gutenberg Blocks, Patterns & Templates
- Date
- Jun 09, 2023
- Research Description
- The Essential Blocks plugin for WordPress is vulnerable to unauthorized use of functionality due to a missing capability check on the get function in versions up to, and including, 4.0.6. This makes it possible for subscriber-level attackers to obtain plugin settings. While a nonce check is present, it is only executed when a nonce is provided. Not providing a nonce results in the nonce verification to be skipped. There is no capability check.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Essential Blocks – Page Builder Gutenberg Blocks, Patterns & Templates # CVE-2023-2083
- CVE, Research URL
- Home page URL
-
Security reports for Essential Blocks – Page Builder Gutenberg Blocks, Patterns & Templates
- Date
- Jun 09, 2023
- Research Description
- The Essential Blocks plugin for WordPress is vulnerable to unauthorized use of functionality due to a missing capability check on the save function in versions up to, and including, 4.0.6. This makes it possible for subscriber-level attackers to save plugin settings. While a nonce check is present, it is only executed when a nonce is provided. Not providing a nonce results in the nonce verification to be skipped. There is no capability check.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Essential Blocks – Page Builder Gutenberg Blocks, Patterns & Templates # CVE-2023-2086
- CVE, Research URL
- Home page URL
-
Security reports for Essential Blocks – Page Builder Gutenberg Blocks, Patterns & Templates
- Date
- Jun 09, 2023
- Research Description
- The Essential Blocks plugin for WordPress is vulnerable to unauthorized use of functionality due to a missing capability check on the template_count function in versions up to, and including, 4.0.6. This makes it possible for subscriber-level attackers to obtain plugin template information. While a nonce check is present, it is only executed when a nonce is provided. Not providing a nonce results in the nonce verification to be skipped. There is no capability check.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Essential Blocks – Page Builder Gutenberg Blocks, Patterns & Templates # CVE-2023-2085
- CVE, Research URL
- Home page URL
-
Security reports for Essential Blocks – Page Builder Gutenberg Blocks, Patterns & Templates
- Date
- Jun 09, 2023
- Research Description
- The Essential Blocks plugin for WordPress is vulnerable to unauthorized use of functionality due to a missing capability check on the templates function in versions up to, and including, 4.0.6. This makes it possible for subscriber-level attackers to obtain plugin template information. While a nonce check is present, it is only executed when a nonce is provided. Not providing a nonce results in the nonce verification to be skipped. There is no capability check.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Essential Blocks – Page Builder Gutenberg Blocks, Patterns & Templates # CVE-2023-6623
- CVE, Research URL
- Home page URL
-
Security reports for Essential Blocks – Page Builder Gutenberg Blocks, Patterns & Templates
- Date
- Jan 15, 2024
- Research Description
- The Essential Blocks WordPress plugin before 4.4.3 does not prevent unauthenticated attackers from overwriting local variables when rendering templates over the REST API, which may lead to Local File Inclusion attacks.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Essential Blocks – Page Builder Gutenberg Blocks, Patterns & Templates # CVE-2024-1854
- CVE, Research URL
- Home page URL
-
Security reports for Essential Blocks – Page Builder Gutenberg Blocks, Patterns & Templates
- Date
- Mar 13, 2024
- Research Description
- The Essential Blocks – Page Builder Gutenberg Blocks, Patterns & Templates plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the blockId parameter in all versions up to, and including, 4.5.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor access or higher, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Essential Blocks – Page Builder Gutenberg Blocks, Patterns & Templates # CVE-2024-31306
- CVE, Research URL
- Home page URL
-
Security reports for Essential Blocks – Page Builder Gutenberg Blocks, Patterns & Templates
- Date
- Apr 07, 2024
- Research Description
- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WPDeveloper Essential Blocks for Gutenberg allows Stored XSS.This issue affects Essential Blocks for Gutenberg: from n/a through 4.5.3.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Essential Blocks – Page Builder Gutenberg Blocks, Patterns & Templates # CVE-2023-2087
- CVE, Research URL
- Home page URL
-
Security reports for Essential Blocks – Page Builder Gutenberg Blocks, Patterns & Templates
- Date
- Jun 09, 2023
- Research Description
- The Essential Blocks plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 4.0.6. This is due to missing or incorrect nonce validation on the save function. This makes it possible for unauthenticated attackers to change plugin settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Essential Blocks – Page Builder Gutenberg Blocks, Patterns & Templates # CVE-2023-4402
- CVE, Research URL
- Home page URL
-
Security reports for Essential Blocks – Page Builder Gutenberg Blocks, Patterns & Templates
- Date
- Oct 20, 2023
- Research Description
- The Essential Blocks plugin for WordPress is vulnerable to PHP Object Injection in versions up to, and including, 4.2.0 via deserialization of untrusted input in the get_products function. This allows unauthenticated attackers to inject a PHP Object. No POP chain is present in the vulnerable plugin. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Essential Blocks – Page Builder Gutenberg Blocks, Patterns & Templates # CVE-2023-4386
- CVE, Research URL
- Home page URL
-
Security reports for Essential Blocks – Page Builder Gutenberg Blocks, Patterns & Templates
- Date
- Oct 20, 2023
- Research Description
- The Essential Blocks plugin for WordPress is vulnerable to PHP Object Injection in versions up to, and including, 4.2.0 via deserialization of untrusted input in the get_posts function. This allows unauthenticated attackers to inject a PHP Object. No POP chain is present in the vulnerable plugin. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Essential Blocks – Page Builder Gutenberg Blocks, Patterns & Templates # CVE-2023-7071
- CVE, Research URL
- Home page URL
-
Security reports for Essential Blocks – Page Builder Gutenberg Blocks, Patterns & Templates
- Date
- Jan 11, 2024
- Research Description
- The Essential Blocks – Page Builder Gutenberg Blocks, Patterns & Templates plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Table of Contents block in all versions up to, and including, 4.4.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Essential Blocks – Page Builder Gutenberg Blocks, Patterns & Templates # CVE-2024-2255
- CVE, Research URL
- Home page URL
-
Security reports for Essential Blocks – Page Builder Gutenberg Blocks, Patterns & Templates
- Date
- Mar 20, 2024
- Research Description
- The Essential Blocks – Page Builder Gutenberg Blocks, Patterns & Templates plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's widgets in all versions up to, and including, 4.5.2 due to insufficient input sanitization and output escaping on user supplied attributes such as listStyle. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Essential Blocks – Page Builder Gutenberg Blocks, Patterns & Templates # CVE-2024-30467
- CVE, Research URL
- Home page URL
-
Security reports for Essential Blocks – Page Builder Gutenberg Blocks, Patterns & Templates
- Date
- Jun 09, 2024
- Research Description
- Missing Authorization vulnerability in WPDeveloper Essential Blocks for Gutenberg.This issue affects Essential Blocks for Gutenberg: from n/a through 4.4.9.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Essential Blocks – Page Builder Gutenberg Blocks, Patterns & Templates # CVE-2024-3818
- CVE, Research URL
- Home page URL
-
Security reports for Essential Blocks – Page Builder Gutenberg Blocks, Patterns & Templates
- Date
- Apr 19, 2024
- Research Description
- The Essential Blocks – Page Builder Gutenberg Blocks, Patterns & Templates plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's "Social Icons" block in all versions up to, and including, 4.5.9 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Essential Blocks – Page Builder Gutenberg Blocks, Patterns & Templates # CVE-2024-4891
- CVE, Research URL
- Home page URL
-
Security reports for Essential Blocks – Page Builder Gutenberg Blocks, Patterns & Templates
- Date
- May 18, 2024
- Research Description
- The Essential Blocks – Page Builder Gutenberg Blocks, Patterns & Templates plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘tagName’ parameter in versions up to, and including, 4.5.12 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Essential Blocks – Page Builder Gutenberg Blocks, Patterns & Templates # CVE-2022-47594
- CVE, Research URL
- Home page URL
-
Security reports for Essential Blocks – Page Builder Gutenberg Blocks, Patterns & Templates
- Date
- Dec 13, 2024
- Research Description
- Missing Authorization vulnerability in WPDeveloper Essential Blocks for Gutenberg allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Essential Blocks for Gutenberg: from n/a through 3.8.5.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Essential Blocks – Page Builder Gutenberg Blocks, Patterns & Templates # CVE-2023-47760
- CVE, Research URL
- Home page URL
-
Security reports for Essential Blocks – Page Builder Gutenberg Blocks, Patterns & Templates
- Date
- Dec 09, 2024
- Research Description
- Missing Authorization vulnerability in WPDeveloper Essential Blocks for Gutenberg allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Essential Blocks for Gutenberg: from n/a through 4.2.0.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Essential Blocks – Page Builder Gutenberg Blocks, Patterns & Templates # CVE-2023-51359
- CVE, Research URL
- Home page URL
-
Security reports for Essential Blocks – Page Builder Gutenberg Blocks, Patterns & Templates
- Date
- Dec 09, 2024
- Research Description
- Missing Authorization vulnerability in WPDeveloper Essential Blocks for Gutenberg allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Essential Blocks for Gutenberg: from n/a through 4.2.0.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Essential Blocks – Page Builder Gutenberg Blocks, Patterns & Templates # CVE-2024-5595
- CVE, Research URL
- Home page URL
-
Security reports for Essential Blocks – Page Builder Gutenberg Blocks, Patterns & Templates
- Date
- Aug 02, 2024
- Research Description
- The Essential Blocks WordPress plugin before 4.7.0 does not validate and escape some of its block options before outputting them back in a page/post where the block is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Essential Blocks – Page Builder Gutenberg Blocks, Patterns & Templates # CVE-2024-47385
- CVE, Research URL
- Home page URL
-
Security reports for Essential Blocks – Page Builder Gutenberg Blocks, Patterns & Templates
- Date
- Oct 05, 2024
- Research Description
- Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in WPDeveloper Essential Blocks for Gutenberg allows Stored XSS.This issue affects Essential Blocks for Gutenberg: from n/a through 4.8.4.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Essential Blocks – Page Builder Gutenberg Blocks, Patterns & Templates # CVE-2024-12045
- CVE, Research URL
- Home page URL
-
Security reports for Essential Blocks – Page Builder Gutenberg Blocks, Patterns & Templates
- Date
- Jan 08, 2025
- Research Description
- The Essential Blocks – Page Builder Gutenberg Blocks, Patterns & Templates plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the maker title value of the Google Maps block in all versions up to, and including, 5.0.9 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level access, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Essential Blocks – Page Builder Gutenberg Blocks, Patterns & Templates # CVE-2023-51360
- CVE, Research URL
- Home page URL
-
Security reports for Essential Blocks – Page Builder Gutenberg Blocks, Patterns & Templates
- Date
- Dec 09, 2024
- Research Description
- Missing Authorization vulnerability in WPDeveloper Essential Blocks for Gutenberg allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Essential Blocks for Gutenberg: from n/a through 4.2.0.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Essential Blocks – Page Builder Gutenberg Blocks, Patterns & Templates # CVE-2025-26871
- CVE, Research URL
- Home page URL
-
Security reports for Essential Blocks – Page Builder Gutenberg Blocks, Patterns & Templates
- Date
- Feb 25, 2025
- Research Description
- Missing Authorization vulnerability in WPDeveloper Essential Blocks for Gutenberg allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Essential Blocks for Gutenberg: from n/a through 4.8.3.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Essential Blocks – Page Builder Gutenberg Blocks, Patterns & Templates # CVE-2025-1664
- CVE, Research URL
- Home page URL
-
Security reports for Essential Blocks – Page Builder Gutenberg Blocks, Patterns & Templates
- Date
- Mar 08, 2025
- Research Description
- The Essential Blocks – Page Builder Gutenberg Blocks, Patterns & Templates plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Parallax slider in all versions up to, and including, 5.3.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Essential Blocks – Page Builder Gutenberg Blocks, Patterns & Templates # CVE-2024-13803
- CVE, Research URL
- Home page URL
-
Security reports for Essential Blocks – Page Builder Gutenberg Blocks, Patterns & Templates
- Date
- Feb 26, 2025
- Research Description
- The Essential Blocks – Page Builder Gutenberg Blocks, Patterns & Templates plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘data-marker’ parameter in all versions up to, and including, 5.2.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable