VYPR
Medium severity6.4NVD Advisory· Published Jun 28, 2024· Updated Apr 15, 2026

CVE-2024-6296

CVE-2024-6296

Description

The Stackable – Page Builder Gutenberg Blocks plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘data-caption’ parameter in all versions up to, and including, 3.13.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Stored XSS in Stackable Page Builder Gutenberg Blocks plugin via insufficiently sanitized 'data-caption' parameter, affecting versions up to 3.13.1.

Vulnerability

The Stackable – Page Builder Gutenberg Blocks plugin for WordPress is vulnerable to Stored Cross-Site Scripting (XSS) in all versions up to and including 3.13.1. The vulnerability resides in insufficient input sanitization and output escaping of the 'data-caption' parameter, allowing authenticated attackers with Contributor-level access or higher to inject arbitrary web scripts.

Exploitation

An attacker must have at least Contributor-level access to the WordPress site. They can inject malicious JavaScript into the 'data-caption' parameter of a Stackable block. When any user (including administrators) views the page containing the injected block, the script executes in their browser.

Impact

Successful exploitation leads to Stored XSS, enabling the attacker to execute arbitrary scripts in the context of the victim's session. This can result in session hijacking, defacement, or redirection to malicious sites. The attack does not require any user interaction beyond viewing the affected page.

Mitigation

The vendor has released version 3.19.8 (as per the WordPress plugin repository [1]), which likely includes a fix. Users should update to the latest version immediately. No workaround is available for older versions. The plugin is actively maintained.

AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

1

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.