Themeum

Qubely

8 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.04%
  • Veröffentlicht 22.09.2025 18:23:30
  • Zuletzt bearbeitet 22.09.2025 21:22:16

Insertion of Sensitive Information Into Sent Data vulnerability in Themeum Qubely allows Retrieve Embedded Sensitive Data. This issue affects Qubely: from n/a through 1.8.14.

  • EPSS 0.04%
  • Veröffentlicht 22.09.2025 18:22:59
  • Zuletzt bearbeitet 22.09.2025 21:22:16

Missing Authorization vulnerability in Themeum Qubely allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Qubely: from n/a through 1.8.14.

  • EPSS 0.17%
  • Veröffentlicht 11.03.2025 07:05:16
  • Zuletzt bearbeitet 26.05.2025 02:31:47

The Qubely – Advanced Gutenberg Blocks plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.8.13 via the 'qubely_get_content'. This makes it possible for authenticated attackers, with Contributo...

  • EPSS 0.08%
  • Veröffentlicht 16.02.2025 23:15:11
  • Zuletzt bearbeitet 23.05.2025 17:46:53

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Themeum Qubely – Advanced Gutenberg Blocks allows Stored XSS. This issue affects Qubely – Advanced Gutenberg Blocks: from n/a through 1.8.12.

  • EPSS 0.11%
  • Veröffentlicht 14.02.2025 07:15:32
  • Zuletzt bearbeitet 25.02.2025 19:42:12

The Qubely – Advanced Gutenberg Blocks plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘align’ and 'UniqueID' parameter in all versions up to, and including, 1.8.12 due to insufficient input sanitization and output escaping...

Exploit
  • EPSS 0.23%
  • Veröffentlicht 16.01.2024 16:15:10
  • Zuletzt bearbeitet 02.06.2025 15:15:21

The Qubely WordPress plugin before 1.8.5 does not validate and escape some of its block options before outputting them back in a page/post where the block is embed, which could allow users with the contributor role and above to perform Stored Cross-S...

Exploit
  • EPSS 3.28%
  • Veröffentlicht 07.08.2023 15:15:10
  • Zuletzt bearbeitet 21.11.2024 05:54:00

The Qubely WordPress plugin before 1.8.6 allows unauthenticated user to send arbitrary e-mails to arbitrary addresses via the qubely_send_form_data AJAX action.

Exploit
  • EPSS 0.12%
  • Veröffentlicht 24.01.2022 08:15:09
  • Zuletzt bearbeitet 21.11.2024 05:54:11

The Qubely WordPress plugin before 1.7.8 does not have authorisation and CSRF check on the qubely_delete_saved_block AJAX action, and does not ensure that the block to be deleted belong to the plugin, as a result, any authenticated users, such as sub...