Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-12045: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wpdevteam Essential Blocks – Page Builder Gutenberg Blocks, Patterns & Templates

0
Medium
VulnerabilityCVE-2024-12045cvecve-2024-12045cwe-79
Published: Wed Jan 08 2025 (01/08/2025, 07:18:38 UTC)
Source: CVE Database V5
Vendor/Project: wpdevteam
Product: Essential Blocks – Page Builder Gutenberg Blocks, Patterns & Templates

Description

CVE-2024-12045 is a stored cross-site scripting (XSS) vulnerability in the Essential Blocks – Page Builder Gutenberg Blocks, Patterns & Templates WordPress plugin affecting versions up to 5. 0. 9. The flaw arises from insufficient sanitization and escaping of the 'maker title' input in the Google Maps block, allowing authenticated administrators on multisite or unfiltered_html-disabled installations to inject malicious scripts. These scripts execute whenever any user accesses the compromised page, potentially leading to session hijacking or unauthorized actions. Exploitation requires administrator privileges and no user interaction is needed. The vulnerability has a CVSS score of 4. 4 (medium severity) and no known exploits in the wild have been reported. Mitigation involves applying patches when available, restricting admin access, and carefully validating inputs. Organizations using multisite WordPress setups with this plugin are primarily at risk, especially in countries with high WordPress adoption.

AI-Powered Analysis

AILast updated: 02/26/2026, 06:58:28 UTC

Technical Analysis

CVE-2024-12045 is a stored cross-site scripting vulnerability identified in the Essential Blocks – Page Builder Gutenberg Blocks, Patterns & Templates plugin for WordPress, specifically affecting all versions up to and including 5.0.9. The vulnerability stems from improper neutralization of input (CWE-79) in the 'maker title' field of the Google Maps block, where insufficient input sanitization and output escaping allow an authenticated attacker with administrator privileges to inject arbitrary JavaScript code. This malicious code is stored persistently and executed in the context of any user who views the compromised page. The vulnerability is limited to multisite WordPress installations or those with the unfiltered_html capability disabled, which restricts direct HTML editing by users. The CVSS 3.1 score of 4.4 reflects a medium severity, considering the attack vector is network-based, requires high attack complexity, and privileges of an administrator, but does not require user interaction. The scope is changed (S:C) because the vulnerability affects resources beyond the attacker’s privileges, potentially impacting other users. The impact includes partial confidentiality and integrity loss, such as session hijacking, defacement, or unauthorized actions performed on behalf of users. No known public exploits have been reported yet, and no official patches were linked at the time of publication. The vulnerability was assigned by Wordfence and published on January 8, 2025.

Potential Impact

This vulnerability poses a significant risk to organizations running multisite WordPress installations with the Essential Blocks plugin, especially where unfiltered_html is disabled. An attacker with administrator access can inject persistent malicious scripts that execute in the browsers of any user visiting the infected page, potentially leading to session hijacking, credential theft, unauthorized actions, or defacement. While exploitation requires administrator privileges, which limits the attack surface, the impact on confidentiality and integrity can be substantial if an attacker gains such access. The vulnerability does not affect availability directly but can undermine trust and lead to reputational damage. Organizations with large user bases or sensitive data accessible via affected WordPress sites are at higher risk. The lack of known exploits in the wild reduces immediate threat but does not eliminate the risk of future exploitation. The medium CVSS score reflects moderate urgency but should not lead to complacency given the potential for privilege escalation and lateral movement within compromised environments.

Mitigation Recommendations

To mitigate CVE-2024-12045, organizations should: 1) Monitor for and apply official patches or updates from the plugin vendor as soon as they become available. 2) Restrict administrator access strictly to trusted personnel and enforce strong authentication mechanisms such as MFA to reduce the risk of credential compromise. 3) For multisite installations, review and limit the use of the Essential Blocks plugin or disable the Google Maps block if not essential. 4) Implement Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. 5) Regularly audit and sanitize all user-generated content, especially inputs that are stored and rendered on pages. 6) Enable security plugins that can detect and block XSS payloads or anomalous administrator behavior. 7) Educate administrators on the risks of injecting untrusted content and the importance of input validation. 8) Consider isolating or segmenting WordPress multisite environments to limit the scope of potential compromise. These steps go beyond generic advice by focusing on access control, input validation, and layered defenses tailored to the plugin’s context.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-12-02T18:07:01.040Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e2bb7ef31ef0b5972aa

Added to database: 2/25/2026, 9:48:27 PM

Last enriched: 2/26/2026, 6:58:28 AM

Last updated: 2/26/2026, 8:06:45 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats