CVE-2023-0376
16.01.2024, 16:15
The Qubely WordPress plugin before 1.8.5 does not validate and escape some of its block options before outputting them back in a page/post where the block is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
Vendor | Product | Version |
---|---|---|
themeum | qubely | 𝑥 < 1.8.5 |
𝑥
= Vulnerable software versions