Input validation vulnerability in GutenGeek Free Gutenberg Blocks for WordPress 1.1.3

A popular WordPress plugin called “GutenGeek Free Gutenberg Blocks” has a security issue that allows hackers to insert harmful code into web pages. This can happen when someone uploads an SVG file, and it affects all versions up to 1.1.3. The problem is caused by not properly checking and cleaning up the input and output of the plugin. Hackers with a certain level of access can take advantage of this and make their code run whenever someone opens the SVG file.

Detected in:

GutenGeek Free Gutenberg Blocks for WordPress open vulnerable versions: >= * <= 1.1.3

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.