Vulnerabilities and security researches forgutentor gutentor
Direction: ascendingGutentor – Gutenberg Blocks – Page Builder for Gutenberg Editor # be25a0fa12b1b84dc16921df18e7676e1c5e8d8a
- CVE, Research URL
- Home page URL
-
Security reports for Gutentor – Gutenberg Blocks – Page Builder for Gutenberg Editor
- Date
- Jul 19, 2023
- Research Description
- Gutentor – Gutenberg Blocks – Page Builder for Gutenberg Editor [gutentor] < 1.0.3 WordPress Gutentor - Gutenberg Blocks - Page Builder for Gutenberg Editor Plugin <= 1.0.2 is vulnerable to Cross Site Scripting (XSS) Update the WordPress Gutentor - Gutenberg Blocks - Page Builder for Gutenberg Editor plugin to the latest available version. Rafie Muhammad (Patchstack) discovered and reported this Cross Site Scripting (XSS) vulnerability in WordPress Gutentor - Gutenberg Blocks - Page Builder for Gutenberg Editor Plugin. This could allow a malicious actor to inject malicious scripts, such as redirects, advertisements, and other HTML payloads into your website which will be executed when guests visit your site. This vulnerability has been fixed in version 1.0.3.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Gutentor – Gutenberg Blocks – Page Builder for Gutenberg Editor # CVE-2024-43308
- CVE, Research URL
- Home page URL
-
Security reports for Gutentor – Gutenberg Blocks – Page Builder for Gutenberg Editor
- Date
- Aug 18, 2024
- Research Description
- Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Gutentor Gutentor - Gutenberg Blocks - Page Builder for Gutenberg Editor allows Stored XSS.This issue affects Gutentor - Gutenberg Blocks - Page Builder for Gutenberg Editor: from n/a through 3.3.5.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Gutentor – Gutenberg Blocks – Page Builder for Gutenberg Editor # CVE-2024-5417
- CVE, Research URL
- Home page URL
-
Security reports for Gutentor – Gutenberg Blocks – Page Builder for Gutenberg Editor
- Date
- Aug 29, 2024
- Research Description
- The Gutentor WordPress plugin before 3.3.6 does not validate and escape some of its block options before outputting them back in a page/post where the block is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Gutentor – Gutenberg Blocks – Page Builder for Gutenberg Editor # CVE-2024-10178
- CVE, Research URL
- Home page URL
-
Security reports for Gutentor – Gutenberg Blocks – Page Builder for Gutenberg Editor
- Date
- Dec 05, 2024
- Research Description
- The Gutentor – Gutenberg Blocks – Page Builder for Gutenberg Editor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Countdown widget in all versions up to, and including, 3.3.9 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Gutentor – Gutenberg Blocks – Page Builder for Gutenberg Editor # CVE-2025-22293
- CVE, Research URL
- Home page URL
-
Security reports for Gutentor – Gutenberg Blocks – Page Builder for Gutenberg Editor
- Date
- Jan 07, 2025
- Research Description
- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Gutentor Gutentor allows DOM-Based XSS.This issue affects Gutentor: from n/a through 3.4.0.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Gutentor – Gutenberg Blocks – Page Builder for Gutenberg Editor # CVE-2025-1986
- CVE, Research URL
- Home page URL
-
Security reports for Gutentor – Gutenberg Blocks – Page Builder for Gutenberg Editor
- Date
- Apr 01, 2025
- Research Description
- The Gutentor WordPress plugin before 3.4.7 does not sanitize and escape a parameter before using it in a SQL statement, allowing admins to perform SQL injection attacks
- Affected versions
-
Min -, max -.
- Status
-
vulnerable