CVSS 3.1 Score 6.4 of 10 (medium)


Published Jun 28, 2024


The Stackable - Page Builder Gutenberg Blocks plugin for WordPress, up to and including version 3.13.1, has a vulnerability (CVE-2024-6296) that allows authenticated attackers with Contributor-level access or higher to inject arbitrary web scripts through the 'data-caption' parameter, leading to stored cross-site scripting. This vulnerability occurs due to insufficient input sanitization and output escaping. The affected products are wrQGIh and wrQDdm. The base severity of this vulnerability is classified as MEDIUM with a base score of 6.4 according to CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N. The potential danger it poses to an organization is low in terms of integrity and confidentiality impact, and there is no user interaction required for exploitation. To remediate this vulnerability, users should update the Stackable - Page Builder Gutenberg Blocks plugin to a version beyond 3.13.1.

Prevent cyber attacks with Recorded Future by prioritizing and patching critical vulnerabilities being exploited by threat actors targeting your industry. Book your demo to learn more.


Prioritize, Pinpoint, and Act to Prevent Vulnerability Exploits with Recorded Future

Note: This is just a basic overview providing quick insights into CVE-2024-6296 information. Gain full access to comprehensive CVE data, third party vulnerabilities, compromised credentials and more with Recorded Future
  • Gain complete coverage of your cyber, third party, and physical attack surface
  • Proactively mitigate threats before they turn into costly attacks
  • Make fast, effective, data-driven decisions