Input validation vulnerability in Qubely – Advanced Gutenberg Blocks 1.8.12

The Qubely – Advanced Gutenberg Blocks plugin for WordPress has a security issue that allows hackers to inject harmful code into pages. This can happen when an authorized person with Contributor-level access or higher uses the ‘align’ and ‘UniqueID’ parameters. This vulnerability affects all versions up to 1.8.12 because the plugin does not properly clean and protect the input and output of the code.

Detected in:

Qubely – Advanced Gutenberg Blocks fixed vulnerable versions: >= * <= 1.8.12

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.