
Cloud Vulnerability DB
A community-led vulnerabilities database
The Magical Blocks WordPress plugin contains a Stored Cross-Site Scripting (XSS) vulnerability, identified as CVE-2025-31844. This security flaw affects versions up to and including 1.0.10 of the plugin. The vulnerability was discovered and publicly disclosed on April 1, 2025, allowing authenticated users with contributor-level access or higher to inject malicious web scripts (WPScan, Patchstack).
The vulnerability stems from insufficient input sanitization and output escaping in the Magical Blocks plugin. It has been classified as CWE-79 (Improper Neutralization of Input During Web Page Generation). The CVSS v3.1 score is 6.5 (Medium) with the following vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L (NVD).
When exploited, this vulnerability allows attackers to inject arbitrary web scripts into pages that will execute whenever a user accesses the compromised page. The stored nature of the XSS means that the malicious scripts persist in the database and execute for any user viewing the affected page (WPScan).
Currently, there is no official fix available for this vulnerability. Users of the Magical Blocks plugin version 1.0.10 or earlier should consider either removing the plugin or implementing additional security controls to restrict access to contributor-level users (Patchstack).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."