🔐 CVE Alert

CVE-2024-8325

MEDIUM 6.4

Gutenberg Page Builder Blocks & Ready-Made Patterns Library <= 3.2.4 - Authenticated (Contributor+) Stored Cross-Site Scripting

CVSS Score
6.4
EPSS Score
0.0%
EPSS Percentile
0th

The Blockspare: Gutenberg Blocks & Patterns for Blogs, Magazines, Business Sites – Post Grids, Sliders, Carousels, Counters, Page Builder & Starter Site Imports, No Coding Needed plugin for WordPress is vulnerable to Stored Cross-Site Scripting via several parameters in the ‘blockspare_render_social_sharing_block’ function in all versions up to, and including, 3.2.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

CWE CWE-79
Vendor blockspare
Product blockspare — news, magazine and blog addons for (gutenberg) block editor
Published Sep 4, 2024
Last Updated Apr 8, 2026
Stay Ahead of the Next One

Get instant alerts for blockspare blockspare — news, magazine and blog addons for (gutenberg) block editor

Be the first to know when new medium vulnerabilities affecting blockspare blockspare — news, magazine and blog addons for (gutenberg) block editor are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

blockspare / BlockSpare — News, Magazine and Blog Addons for (Gutenberg) Block Editor
0 ≤ 3.2.4

References

NVD ↗ CVE.org ↗ EPSS Data ↗
wordfence.com: https://www.wordfence.com/threat-intel/vulnerabilities/id/c23995c6-989e-48d2-ba60-b0bf7b750245?source=cve plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/changeset/3145729/

Credits

Francesco Carlucci