Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-4209: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in britner Gutenberg Blocks with AI by Kadence WP – Page Builder Features

0
Medium
VulnerabilityCVE-2024-4209cvecve-2024-4209cwe-79
Published: Sat May 11 2024 (05/11/2024, 01:56:00 UTC)
Source: CVE Database V5
Vendor/Project: britner
Product: Gutenberg Blocks with AI by Kadence WP – Page Builder Features

Description

CVE-2024-4209 is a stored cross-site scripting (XSS) vulnerability in the Gutenberg Blocks with AI by Kadence WP – Page Builder Features WordPress plugin, affecting all versions up to 3. 2. 36. The flaw arises from insufficient input sanitization and output escaping on user-supplied attributes in the countdown timer block. Authenticated users with contributor-level access or higher can inject malicious scripts that execute when any user views the compromised page. This vulnerability can lead to session hijacking, defacement, or unauthorized actions within the affected WordPress sites. Exploitation does not require user interaction beyond visiting the infected page, and the attack scope is limited to sites using this plugin. No known exploits are currently reported in the wild. The CVSS 3. 1 base score is 6.

AI-Powered Analysis

AILast updated: 02/26/2026, 00:30:53 UTC

Technical Analysis

CVE-2024-4209 is a stored cross-site scripting vulnerability classified under CWE-79, found in the Gutenberg Blocks with AI by Kadence WP – Page Builder Features plugin for WordPress. The vulnerability affects all versions up to and including 3.2.36. It stems from improper neutralization of input during web page generation, specifically in the countdown timer block where user-supplied attributes are not adequately sanitized or escaped before being rendered. This allows authenticated attackers with contributor-level permissions or higher to inject arbitrary JavaScript code into pages. When other users access these pages, the injected scripts execute in their browsers, potentially compromising session tokens, redirecting users, or performing unauthorized actions on behalf of the victim. The vulnerability requires authentication but no additional user interaction beyond page access. The CVSS 3.1 vector (AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N) indicates network attack vector, low attack complexity, privileges required, no user interaction, and a scope change with limited confidentiality and integrity impact but no availability impact. No patches or exploits are currently publicly available, but the risk remains significant for sites using this plugin. The vulnerability highlights the importance of rigorous input validation and output encoding in WordPress plugin development to prevent persistent XSS attacks.

Potential Impact

The primary impact of CVE-2024-4209 is the compromise of confidentiality and integrity on affected WordPress sites. Attackers with contributor-level access can inject malicious scripts that execute in the context of any user viewing the infected page, potentially leading to session hijacking, theft of sensitive information, unauthorized actions such as content modification or privilege escalation, and site defacement. This can damage the reputation of organizations, lead to data breaches, and undermine user trust. Since WordPress powers a significant portion of the web, and the Kadence plugin is popular among site builders, the vulnerability could affect a wide range of organizations, from small businesses to large enterprises relying on WordPress for their web presence. Although exploitation requires authenticated access, contributor-level permissions are commonly granted to trusted users, increasing the risk of insider threats or compromised accounts being leveraged. The lack of known exploits in the wild reduces immediate risk but does not eliminate the potential for future attacks. The vulnerability does not impact availability directly but can indirectly cause service disruptions through defacement or administrative lockout scenarios.

Mitigation Recommendations

To mitigate CVE-2024-4209, organizations should first update the Gutenberg Blocks with AI by Kadence WP plugin to a version where the vulnerability is fixed once available. Until a patch is released, administrators should restrict contributor-level access strictly to trusted users and review existing user permissions to minimize exposure. Implementing a Web Application Firewall (WAF) with custom rules to detect and block suspicious input patterns targeting the countdown timer block can help prevent exploitation. Site owners should enable Content Security Policy (CSP) headers to limit the execution of unauthorized scripts. Regularly audit and sanitize user-generated content, especially in areas where contributors can input data. Monitoring site logs for unusual activity or injected scripts can provide early detection of exploitation attempts. Additionally, educating contributors about secure content practices and the risks of XSS can reduce inadvertent introduction of malicious code. Finally, maintain regular backups to enable quick recovery if an attack occurs.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-04-25T17:52:02.085Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6b84b7ef31ef0b5562f2

Added to database: 2/25/2026, 9:37:08 PM

Last enriched: 2/26/2026, 12:30:53 AM

Last updated: 2/26/2026, 8:07:28 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats