Blog

"Prevention is cheaper than a breach"

Live Vulnerability Intelligence

Threat Database

Search CVEs, inspect descriptions, and open detail pages with AI-assisted technical context.

Total8
Critical0
High1
Medium6
Reset
Showing 1-8 of 8 records
Threat Entry Updated 2025-03-25

CVE-2024-10867 - Gutenberg Plugin

The Borderless – Widgets, Elements, Templates and Toolkit for Elementor & Gutenberg plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 1.5.9 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file.

PLUGIN Gutenberg

CVE-2024-10867

MEDIUM CVSS 5.4 2025-01-31
Threat Entry Updated 2025-01-31

CVE-2024-11600 - Gutenberg Plugin

The Borderless – Widgets, Elements, Templates and Toolkit for Elementor & Gutenberg plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 1.5.9 via the 'write_config' function. This is due to a lack of sanitization on an imported JSON file. This makes it possible for authenticated attackers, with Administrator-level access and above, to execute code on the server.

PLUGIN Gutenberg

CVE-2024-11600

HIGH CVSS 7.2 2025-01-30
Threat Entry Updated 2025-01-31

CVE-2024-11583 - Gutenberg Plugin

The Borderless – Widgets, Elements, Templates and Toolkit for Elementor & Gutenberg plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the 'remove_zipped_font' function in all versions up to, and including, 1.5.9. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete icon fonts that were previously uploaded.

PLUGIN Gutenberg

CVE-2024-11583

MEDIUM CVSS 4.3 2025-01-30
Threat Entry Updated 2025-03-21

CVE-2024-4666 - Gutenberg Plugin

The Borderless – Widgets, Elements, Templates and Toolkit for Elementor & Gutenberg plugin for WordPress is vulnerable to Stored Cross-Site Scripting via multiple widgets in all versions up to, and including, 1.5.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Gutenberg

CVE-2024-4666

MEDIUM CVSS 6.4 2024-05-14
Threat Entry Updated 2024-11-21

CVE-2024-2845 - Gutenberg Plugin

The BetterDocs – Best Documentation, FAQ & Knowledge Base Plugin with AI Support & Instant Answer For Elementor & Gutenberg plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's shortcode(s) in all versions up to, and including, 3.4.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Gutenberg

CVE-2024-2845

MEDIUM CVSS 6.4 2024-04-09
Threat Entry Updated 2025-06-03

CVE-2023-6843 - Gutenberg Plugin

The easy.jobs- Best Recruitment Plugin for Job Board Listing, Manager, Career Page for Elementor & Gutenberg WordPress plugin before 2.4.7 does not properly secure some of its AJAX actions, allowing any logged-in users to modify its settings.

PLUGIN Gutenberg

CVE-2023-6843

MEDIUM CVSS 4.3 2024-01-15
Threat Entry Updated 2024-11-21

CVE-2023-38000 - Gutenberg Plugin

Auth. Stored (contributor+) Cross-Site Scripting (XSS) vulnerability in WordPress core 6.3 through 6.3.1, from 6.2 through 6.2.2, from 6.1 through 6.1.3, from 6.0 through 6.0.5, from 5.9 through 5.9.7 and Gutenberg plugin

PLUGIN Gutenberg

CVE-2023-38000

MEDIUM CVSS 6.5 2023-10-13
Threat Entry Updated 2024-11-21

CVE-2022-33994 - Gutenberg Plugin

The Gutenberg plugin through 13.7.3 for WordPress allows stored XSS by the Contributor role via an SVG document to the "Insert from URL" feature. NOTE: the XSS payload does not execute in the context of the WordPress instance's domain; however, analogous attempts by low-privileged users to reference SVG documents are blocked by some similar products, and this behavioral difference might have security relevance to some WordPress site administrators.

PLUGIN Gutenberg

CVE-2022-33994

LOW CVSS 3.0 2022-07-30
Scroll to top