CVE Radar Logo
CVERadar
CVE Radar Logo
CVERadar

CVE-2024-8318

Medium Severity
SVRS
30/100

CVSSv3
5.4/10

EPSS
0.00048/1

CVE-2024-8318 is a Stored Cross-Site Scripting (XSS) vulnerability found in the Attributes for Blocks WordPress plugin. This vulnerability allows authenticated attackers with Contributor-level access or higher to inject malicious web scripts into pages. The Attributes for Blocks plugin, up to version 1.0.6, fails to properly sanitize user inputs and escape outputs. When a user views a page containing the injected script, the script executes within their browser. While the CVSS score is 5.4, SOCRadar's Vulnerability Risk Score (SVRS) is 30, suggesting a relatively lower immediate threat level. However, organizations should still address the XSS vulnerability promptly to prevent potential account compromise or malware distribution. The vulnerability lies in the insufficient input sanitization. It is essential to update to a patched version of the WordPress plugin.

No tags available
CVSS:3.1
AV:N
AC:L
PR:L
UI:R
S:C
C:L
I:L
A:N
2024-09-04

2024-10-05
Eye Icon
SOCRadar
AI Insight

Description

CVE-2024-8318 is a Stored Cross-Site Scripting (XSS) vulnerability in the Attributes for Blocks plugin for WordPress. It allows authenticated attackers with Contributor-level access or higher to inject malicious scripts into pages, which will execute when users access those pages. This could lead to account takeover, data theft, or other malicious activities.

Key Insights

  • High Severity: The SVRS of 46 indicates a moderate level of severity, highlighting the need for attention and timely action.
  • Authenticated Attackers: The vulnerability requires authenticated attackers with Contributor-level access or higher, making it more targeted and potentially more damaging.
  • Active Exploitation: There are no known active exploits for this vulnerability at this time. However, it is important to note that vulnerabilities can be exploited quickly after they are disclosed.
  • WordPress Plugin: The vulnerability affects the Attributes for Blocks plugin, which is widely used by WordPress websites. This increases the potential impact of the vulnerability.

Mitigation Strategies

  • Update the Plugin: Update the Attributes for Blocks plugin to version 1.0.7 or later to patch the vulnerability.
  • Restrict Access: Limit access to the WordPress dashboard to only authorized users with the minimum necessary permissions.
  • Enable Security Measures: Implement security measures such as input validation, output escaping, and cross-site scripting (XSS) protection to prevent similar vulnerabilities from being exploited.
  • Monitor for Suspicious Activity: Monitor website logs and traffic for any suspicious activity that could indicate an attack.

Additional Information

If you have any further questions regarding this incident, you can use the 'Ask to Analyst' feature, contact SOCRadar directly, or open a support ticket for more information.

Indicators of Compromise

No IOCs found for this CVE

Exploits

No exploits found for this CVE

Enhance Your CVE Management with SOCRadar Vulnerability Intelligence
Get comprehensive CVE details, real-time notifications, and proactive threat management all in one platform.
CVE Details
Access comprehensive CVE information instantly
Real-time Tracking
Subscribe to CVEs and get instant updates
Exploit Analysis
Monitor related APT groups and threats
IOC Tracking
Analyze and track CVE-related IOCs

News

CVE-2024-8318 | Attributes for Blocks Plugin up to 1.0.6 on WordPress attributesForBlocks cross site scripting
vuldb.com2024-10-05
CVE-2024-8318 | Attributes for Blocks Plugin up to 1.0.6 on WordPress attributesForBlocks cross site scripting | A vulnerability was found in Attributes for Blocks Plugin up to 1.0.6 on WordPress and classified as problematic. This issue affects some unknown processing. The manipulation of the argument attributesForBlocks leads to cross site scripting. The identification of this vulnerability is CVE-2024-8318. The attack may be
cve-2024-8318
domains
urls
cves

Social Media

CVE-2024-8318 The Attributes for Blocks plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘attributesForBlocks’ parameter in all versions up to, and including… https://t.co/ZDxwfrqWGv
0
0
0

Affected Software

No affected software found for this CVE

References

ReferenceLink
[email protected]https://plugins.trac.wordpress.org/browser/attributes-for-blocks/trunk/attributes-for-blocks.php#L246
[email protected]https://plugins.trac.wordpress.org/browser/attributes-for-blocks/trunk/attributes-for-blocks.php#L96
[email protected]https://plugins.trac.wordpress.org/changeset?old_path=%2Fattributes-for-blocks&old=3066420&new_path=%2Fattributes-for-blocks&new=3144730&sfp_email=&sfph_mail=
[email protected]https://wordpress.org/plugins/attributes-for-blocks/#developers
[email protected]https://www.wordfence.com/threat-intel/vulnerabilities/id/a0101dd1-a9cb-4b9c-8299-9b808d7e1912?source=cve

CWE Details

CWE IDCWE NameDescription
CWE-79Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')The software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.

CVE Radar

Real-time CVE Intelligence & Vulnerability Management Platform

CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.

Get Free Vulnerability Intelligence AccessAccess real-time CVE monitoring, exploit analysis, and threat intelligence