CVE-2024-12304: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in britner Gutenberg Blocks with AI by Kadence WP – Page Builder Features
CVE-2024-12304 is a stored cross-site scripting (XSS) vulnerability in the Gutenberg Blocks with AI by Kadence WP – Page Builder Features WordPress plugin, affecting all versions up to 3. 4. 2. Authenticated users with Contributor-level privileges or higher can inject malicious scripts via the button block link, which execute when any user views the compromised page. The vulnerability arises from insufficient input sanitization and output escaping. Exploitation does not require user interaction beyond page access and can impact confidentiality and integrity by executing arbitrary scripts in the context of the affected site. The CVSS score is 6. 4 (medium severity), reflecting network exploitability with low attack complexity but requiring privileges. No known public exploits exist yet. Organizations using this plugin should prioritize patching or applying mitigations to prevent potential script injection attacks that could lead to session hijacking, defacement, or unauthorized actions.
AI Analysis
Technical Summary
CVE-2024-12304 is a stored cross-site scripting (XSS) vulnerability identified in the Gutenberg Blocks with AI by Kadence WP – Page Builder Features plugin for WordPress, affecting all versions up to and including 3.4.2. The vulnerability is classified under CWE-79, which involves improper neutralization of input during web page generation. Specifically, the flaw exists in the handling of the button block link, where insufficient input sanitization and output escaping allow authenticated users with Contributor-level access or higher to inject arbitrary JavaScript code. This malicious code is stored persistently in the WordPress database and executed whenever any user accesses the affected page, enabling attackers to perform actions such as session hijacking, privilege escalation, or content manipulation. The vulnerability requires authentication but no additional user interaction, and the attack surface includes any site using this plugin with the vulnerable versions. The CVSS v3.1 score of 6.4 indicates a medium severity, with network attack vector, low attack complexity, privileges required, no user interaction, and a scope change due to potential impact on other users. Although no known exploits are currently in the wild, the widespread use of WordPress and this plugin makes timely remediation critical. The vulnerability highlights the importance of rigorous input validation and output encoding in web application components, especially those that allow user-generated content to be rendered dynamically.
Potential Impact
The impact of CVE-2024-12304 on organizations worldwide can be significant, particularly for those relying on the Gutenberg Blocks with AI by Kadence WP plugin for their WordPress sites. Successful exploitation allows attackers with Contributor-level access to inject persistent malicious scripts, which execute in the browsers of any users visiting the compromised pages. This can lead to theft of authentication cookies, enabling session hijacking and unauthorized access to user accounts, including potentially administrative accounts if session tokens are stolen. Attackers could also manipulate page content, deface websites, or redirect users to malicious sites, damaging organizational reputation and user trust. While the vulnerability does not directly affect availability, the integrity and confidentiality of site data and user information are at risk. Given WordPress's extensive global usage, especially among small to medium enterprises, blogs, and e-commerce sites, the vulnerability could be leveraged for targeted attacks or broader campaigns. The requirement for authenticated access limits the attacker's initial entry point but does not eliminate risk, as Contributor-level accounts are common in collaborative environments. The scope of impact extends beyond the initial attacker, affecting all visitors to the infected pages, thus amplifying potential damage.
Mitigation Recommendations
To mitigate CVE-2024-12304, organizations should first update the Gutenberg Blocks with AI by Kadence WP plugin to a version where the vulnerability is patched once available. Until a patch is released, administrators should restrict Contributor-level and higher privileges to trusted users only, minimizing the risk of malicious script injection. Implementing a Web Application Firewall (WAF) with rules to detect and block suspicious script payloads in input fields related to the button block link can provide interim protection. Site owners should audit existing content for injected scripts and remove any suspicious code. Enforcing Content Security Policy (CSP) headers can reduce the impact of XSS by restricting the execution of unauthorized scripts. Additionally, hardening WordPress installations by disabling unnecessary plugins, enforcing strong authentication mechanisms, and regularly monitoring logs for unusual activities will help detect and prevent exploitation attempts. Educating content contributors about safe input practices and the risks of injecting untrusted content is also beneficial. Finally, security teams should prepare incident response plans to quickly address any detected exploitation.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Netherlands, India, Brazil, Japan
CVE-2024-12304: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in britner Gutenberg Blocks with AI by Kadence WP – Page Builder Features
Description
CVE-2024-12304 is a stored cross-site scripting (XSS) vulnerability in the Gutenberg Blocks with AI by Kadence WP – Page Builder Features WordPress plugin, affecting all versions up to 3. 4. 2. Authenticated users with Contributor-level privileges or higher can inject malicious scripts via the button block link, which execute when any user views the compromised page. The vulnerability arises from insufficient input sanitization and output escaping. Exploitation does not require user interaction beyond page access and can impact confidentiality and integrity by executing arbitrary scripts in the context of the affected site. The CVSS score is 6. 4 (medium severity), reflecting network exploitability with low attack complexity but requiring privileges. No known public exploits exist yet. Organizations using this plugin should prioritize patching or applying mitigations to prevent potential script injection attacks that could lead to session hijacking, defacement, or unauthorized actions.
AI-Powered Analysis
Technical Analysis
CVE-2024-12304 is a stored cross-site scripting (XSS) vulnerability identified in the Gutenberg Blocks with AI by Kadence WP – Page Builder Features plugin for WordPress, affecting all versions up to and including 3.4.2. The vulnerability is classified under CWE-79, which involves improper neutralization of input during web page generation. Specifically, the flaw exists in the handling of the button block link, where insufficient input sanitization and output escaping allow authenticated users with Contributor-level access or higher to inject arbitrary JavaScript code. This malicious code is stored persistently in the WordPress database and executed whenever any user accesses the affected page, enabling attackers to perform actions such as session hijacking, privilege escalation, or content manipulation. The vulnerability requires authentication but no additional user interaction, and the attack surface includes any site using this plugin with the vulnerable versions. The CVSS v3.1 score of 6.4 indicates a medium severity, with network attack vector, low attack complexity, privileges required, no user interaction, and a scope change due to potential impact on other users. Although no known exploits are currently in the wild, the widespread use of WordPress and this plugin makes timely remediation critical. The vulnerability highlights the importance of rigorous input validation and output encoding in web application components, especially those that allow user-generated content to be rendered dynamically.
Potential Impact
The impact of CVE-2024-12304 on organizations worldwide can be significant, particularly for those relying on the Gutenberg Blocks with AI by Kadence WP plugin for their WordPress sites. Successful exploitation allows attackers with Contributor-level access to inject persistent malicious scripts, which execute in the browsers of any users visiting the compromised pages. This can lead to theft of authentication cookies, enabling session hijacking and unauthorized access to user accounts, including potentially administrative accounts if session tokens are stolen. Attackers could also manipulate page content, deface websites, or redirect users to malicious sites, damaging organizational reputation and user trust. While the vulnerability does not directly affect availability, the integrity and confidentiality of site data and user information are at risk. Given WordPress's extensive global usage, especially among small to medium enterprises, blogs, and e-commerce sites, the vulnerability could be leveraged for targeted attacks or broader campaigns. The requirement for authenticated access limits the attacker's initial entry point but does not eliminate risk, as Contributor-level accounts are common in collaborative environments. The scope of impact extends beyond the initial attacker, affecting all visitors to the infected pages, thus amplifying potential damage.
Mitigation Recommendations
To mitigate CVE-2024-12304, organizations should first update the Gutenberg Blocks with AI by Kadence WP plugin to a version where the vulnerability is patched once available. Until a patch is released, administrators should restrict Contributor-level and higher privileges to trusted users only, minimizing the risk of malicious script injection. Implementing a Web Application Firewall (WAF) with rules to detect and block suspicious script payloads in input fields related to the button block link can provide interim protection. Site owners should audit existing content for injected scripts and remove any suspicious code. Enforcing Content Security Policy (CSP) headers can reduce the impact of XSS by restricting the execution of unauthorized scripts. Additionally, hardening WordPress installations by disabling unnecessary plugins, enforcing strong authentication mechanisms, and regularly monitoring logs for unusual activities will help detect and prevent exploitation attempts. Educating content contributors about safe input practices and the risks of injecting untrusted content is also beneficial. Finally, security teams should prepare incident response plans to quickly address any detected exploitation.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2024-12-06T15:03:45.738Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6e36b7ef31ef0b597d9f
Added to database: 2/25/2026, 9:48:38 PM
Last enriched: 2/26/2026, 5:29:32 AM
Last updated: 2/26/2026, 7:53:11 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25191: Uncontrolled Search Path Element in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-23703: Incorrect default permissions in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-1311: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in bearsthemes Worry Proof Backup
HighFinding Signal in the Noise: Lessons Learned Running a Honeypot with AI Assistance [Guest Diary], (Tue, Feb 24th)
MediumCVE-2026-2506: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motahar1 EM Cost Calculator
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.