CVE Radar Logo
CVERadar
CVE Radar Logo
CVERadar

CVE-2024-12268

Medium Severity
SVRS
30/100

CVSSv3
NA/10

EPSS
0.0001/1

CVE-2024-12268 is a Stored Cross-Site Scripting (XSS) vulnerability found in the Responsive Blocks – WordPress Gutenberg Blocks plugin. This WordPress plugin flaw allows authenticated attackers with Contributor-level access or higher to inject malicious web scripts into pages. Due to insufficient input sanitization, these scripts execute whenever a user visits the compromised page. The vulnerability affects versions up to and including 1.9.7. While the CVSS score is 0, indicating minimal impact according to that system, the SOCRadar Vulnerability Risk Score (SVRS) is 30. Although not critical (SVRS > 80), this XSS vulnerability can still lead to account compromise, data theft, and website defacement, highlighting the importance of patching to mitigate these risks.

In The Wild
2024-12-24

2024-12-24
Eye Icon
SOCRadar
AI Insight

Description

CVE-2024-12268 affects the Responsive Blocks – WordPress Gutenberg Blocks plugin, exposing it to a Stored Cross-Site Scripting (XSS) vulnerability. This vulnerability arises from insufficient input sanitization and output escaping within the 'responsive-block-editor-addons/portfolio' block. The vulnerability allows authenticated attackers with Contributor-level access or higher to inject malicious JavaScript into WordPress pages. This JavaScript executes whenever a user visits the injected page, potentially leading to account compromise, data theft, or other malicious actions.

The SOCRadar Vulnerability Risk Score (SVRS) for this CVE is 46, indicating a moderate vulnerability requiring attention and prompt action. While the CVSS score of 6.4 suggests a medium severity, the SVRS provides a more nuanced understanding of the risk based on factors beyond just technical severity.

Key Insights

  • Impact: Successful exploitation of this vulnerability could allow attackers to steal sensitive data, manipulate website content, or even redirect users to malicious websites.
  • Attacker Profile: The vulnerability can be exploited by authenticated attackers with at least Contributor-level access. This means individuals with administrative privileges within the WordPress environment are at risk.
  • Exploitation: As the vulnerability involves stored XSS, attackers can leave their malicious scripts permanently embedded within the affected WordPress pages. This means the attack can persist even after the initial injection, potentially impacting a large number of users over time.
  • Wide Applicability: The Responsive Blocks plugin is popular, and its widespread adoption increases the potential impact of this vulnerability.

Mitigation Strategies

  1. Plugin Update: Immediately update the Responsive Blocks – WordPress Gutenberg Blocks plugin to version 1.9.8 or higher. This update includes critical security patches that address the vulnerability.
  2. Website Security Audit: Conduct a thorough security audit of the affected WordPress website to identify any potential signs of compromise. This audit should include scanning for malicious scripts and checking for any unauthorized access attempts.
  3. User Training: Educate website administrators and content contributors about the importance of security best practices, such as avoiding suspicious links, keeping software updated, and using strong passwords.
  4. Web Application Firewall (WAF): Implement a WAF to help protect against XSS attacks by filtering out malicious scripts before they can reach the WordPress website.

Additional Information

If you have any further questions about CVE-2024-12268 or require additional information, please use the "Ask to Analyst" feature, contact SOCRadar directly, or open a support ticket for assistance.

Indicators of Compromise

No IOCs found for this CVE

Exploits

No exploits found for this CVE

Enhance Your CVE Management with SOCRadar Vulnerability Intelligence
Get comprehensive CVE details, real-time notifications, and proactive threat management all in one platform.
CVE Details
Access comprehensive CVE information instantly
Real-time Tracking
Subscribe to CVEs and get instant updates
Exploit Analysis
Monitor related APT groups and threats
IOC Tracking
Analyze and track CVE-related IOCs

News

CVE-2024-12268 | Responsive Blocks Plugin up to 1.9.7 on WordPress cross site scripting
vuldb.com2025-02-16
CVE-2024-12268 | Responsive Blocks Plugin up to 1.9.7 on WordPress cross site scripting | A vulnerability classified as problematic was found in Responsive Blocks Plugin up to 1.9.7 on WordPress. Affected by this vulnerability is an unknown functionality. The manipulation leads to cross site scripting. This vulnerability is known as CVE-2024-12268. The attack can be launched remotely. There is no exploit available.
vuldb.com
rss
forum
news

Social Media

CVE-2024-12268 The Responsive Blocks – WordPress Gutenberg Blocks plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'responsive-block-editor-addons/portfolio… https://t.co/NyLOsc2IzU
0
0
1

Affected Software

No affected software found for this CVE

References

ReferenceLink
[email protected]https://plugins.trac.wordpress.org/changeset/3208350/responsive-block-editor-addons/tags/1.9.8/src/blocks/portfolio/index.php
[email protected]https://www.wordfence.com/threat-intel/vulnerabilities/id/0e951b97-3d17-4360-8fec-393e2f0c13d2?source=cve

CWE Details

CWE IDCWE NameDescription
CWE-79Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')The software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.

CVE Radar

Real-time CVE Intelligence & Vulnerability Management Platform

CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.

Get Free Vulnerability Intelligence AccessAccess real-time CVE monitoring, exploit analysis, and threat intelligence