Vulnerabilities and security researches forultimate-addons-for-gutenberg ultimate-addons-for-gutenberg
Direction: descendingMar 26, 2025
Spectra – WordPress Gutenberg Blocks # CVE-2025-1784
- CVE, Research URL
- Application
- Date
- Mar 26, 2025
- Research Description
- The Spectra – WordPress Gutenberg Blocks plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the uagb block in all versions up to, and including, 2.19.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Dec 03, 2024
Spectra – WordPress Gutenberg Blocks # CVE-2024-10484
- CVE, Research URL
- Application
- Date
- Dec 03, 2024
- Research Description
- The Spectra – WordPress Gutenberg Blocks plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'Team' widget in all versions up to, and including, 2.16.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Aug 12, 2024
Spectra – WordPress Gutenberg Blocks # CVE-2024-7590
- CVE, Research URL
- Application
- Date
- Aug 13, 2024
- Research Description
- Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Brainstorm Force Spectra allows Stored XSS.This issue affects Spectra: from n/a through 2.14.1.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Jul 09, 2024
Spectra – WordPress Gutenberg Blocks # CVE-2024-37517
- CVE, Research URL
- Application
- Date
- Nov 01, 2024
- Research Description
- Missing Authorization vulnerability in Brainstorm Force Spectra allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Spectra: from n/a through 2.13.7.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Spectra – WordPress Gutenberg Blocks # CVE-2023-36676
- CVE, Research URL
- Application
- Date
- Jun 19, 2024
- Research Description
- Missing Authorization vulnerability in Brainstorm Force Spectra.This issue affects Spectra: from n/a through 2.6.6.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Jun 10, 2024
Spectra – WordPress Gutenberg Blocks # CVE-2023-23729
- CVE, Research URL
- Application
- Date
- -
- Research Description
- The Spectra – WordPress Gutenberg Blocks plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on the forms_recaptcha function in versions up to, and including, 2.3.1. This makes it possible for authenticated attackers with contributor-level permissions and above to modify the plugin's Captcha settings.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Spectra – WordPress Gutenberg Blocks # CVE-2023-23825
- CVE, Research URL
- Application
- Date
- Dec 09, 2024
- Research Description
- Missing Authorization vulnerability in Brainstorm Force Spectra allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Spectra: from n/a through 2.3.0.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Spectra – WordPress Gutenberg Blocks # CVE-2023-23834
- CVE, Research URL
- Application
- Date
- Dec 09, 2024
- Research Description
- Missing Authorization vulnerability in Brainstorm Force Spectra allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Spectra: from n/a through 2.3.0.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Jun 06, 2024
Spectra – WordPress Gutenberg Blocks # CVE-2023-23730
- CVE, Research URL
- Application
- Date
- Jun 04, 2024
- Research Description
- Improper Restriction of Excessive Authentication Attempts vulnerability in Brainstorm Force Spectra allows Functionality Bypass.This issue affects Spectra: from n/a through 2.3.0.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Spectra – WordPress Gutenberg Blocks # CVE-2020-36656
- CVE, Research URL
- Application
- Date
- Feb 21, 2023
- Research Description
- The Spectra WordPress plugin before 1.15.0 does not sanitize user input as it reaches its style HTML attribute, allowing contributors to conduct stored XSS attacks via the plugin's Gutenberg blocks.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Spectra – WordPress Gutenberg Blocks # CVE-2023-23738
- CVE, Research URL
- Application
- Date
- Jun 04, 2024
- Research Description
- Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') vulnerability in Brainstorm Force Spectra allows Content Spoofing, Phishing.This issue affects Spectra: from n/a through 2.3.0.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Spectra – WordPress Gutenberg Blocks # bb6dea6f94721434f43a50f43ef4261fea75a920
- CVE, Research URL
- Application
- Date
- Apr 08, 2020
- Research Description
- Spectra Gutenberg Blocks – Website Builder for the Block Editor [ultimate-addons-for-gutenberg] < 1.14.8 WordPress Gutenberg Blocks plugin <= 1.14.7 - Authenticated Settings Change vulnerability Authenticated Settings Change vulnerability discovered by NinTechNet in WordPress Gutenberg Blocks plugin (versions <= 1.14.7).
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Spectra – WordPress Gutenberg Blocks # CVE-2023-23735
- CVE, Research URL
- Application
- Date
- Jun 04, 2024
- Research Description
- Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) vulnerability in Brainstorm Force Spectra allows Code Injection.This issue affects Spectra: from n/a through 2.3.0.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Spectra – WordPress Gutenberg Blocks # CVE-2020-36702
- CVE, Research URL
- Application
- Date
- Jun 07, 2023
- Research Description
- The Ultimate Addons for Gutenberg plugin for WordPress is vulnerable to Authenticated Settings Change in versions up to, and including, 1.14.7. This is due to missing capability checks on several AJAX actions. This makes it possible for authenticated attackers with subscriber+ roles to update the plugin's settings.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Spectra – WordPress Gutenberg Blocks # CVE-2024-3107
- CVE, Research URL
- Application
- Date
- May 02, 2024
- Research Description
- The Spectra – WordPress Gutenberg Blocks plugin for WordPress is vulnerable to Path Traversal in versions up to, and including, 2.12.6 via the get_block_default_attributes function. This allows authenticated attackers, with contributor-level permissions and above, to read the contents of any files named attributes.php on the server, which can contain sensitive information.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Spectra – WordPress Gutenberg Blocks # CVE-2024-1815
- CVE, Research URL
- Application
- Date
- May 23, 2024
- Research Description
- The Spectra – WordPress Gutenberg Blocks plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Image Gallery block in all versions up to, and including, 2.12.8 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Spectra – WordPress Gutenberg Blocks # CVE-2024-4366
- CVE, Research URL
- Application
- Date
- May 24, 2024
- Research Description
- The Spectra – WordPress Gutenberg Blocks plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘block_id’ parameter in versions up to, and including, 2.13.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with author-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Spectra – WordPress Gutenberg Blocks # CVE-2023-36679
- CVE, Research URL
- Application
- Date
- Mar 28, 2024
- Research Description
- Server-Side Request Forgery (SSRF) vulnerability in Brainstorm Force Spectra.This issue affects Spectra: from n/a through 2.6.6.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Spectra – WordPress Gutenberg Blocks # CVE-2023-49833
- CVE, Research URL
- Application
- Date
- Dec 14, 2023
- Research Description
- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Brainstorm Force Spectra – WordPress Gutenberg Blocks allows Stored XSS.This issue affects Spectra – WordPress Gutenberg Blocks: from n/a through 2.7.9.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Spectra – WordPress Gutenberg Blocks # CVE-2023-6486
- CVE, Research URL
- Application
- Date
- Apr 10, 2024
- Research Description
- The Spectra – WordPress Gutenberg Blocks plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Custom CSS metabox in all versions up to and including 2.10.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Spectra – WordPress Gutenberg Blocks # CVE-2024-1814
- CVE, Research URL
- Application
- Date
- May 23, 2024
- Research Description
- The Spectra – WordPress Gutenberg Blocks plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Testimonial block in all versions up to, and including, 2.12.8 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable