CVE-2026-6551
Published: Tue, 28 Apr 2026 06:16
Summary
The Timeline Blocks for Gutenberg plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'titleTag' attribute of the timeline-blocks/tb-timeline-blocks block in all versions up to,
Details
The Timeline Blocks for Gutenberg plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'titleTag' attribute of the timeline-blocks/tb-timeline-blocks block in all versions up to, and including, 1.1.10 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Are YOU affected by CVE-2026-6551?
5-second check on your actual server. Reads /etc/os-release, uname -r, and dpkg-query; matches against the live USN + Debian Security Tracker feeds; tells you whether CVE-2026-6551 (and any other live CVE) applies. Anonymous, no signup.
curl https://mindsparkstack.com/scan.sh | bash
References
- https://plugins.trac.wordpress.org/browser/timeline-blocks/tags/1.1.10/src/blocks/index.php#L202
- https://plugins.trac.wordpress.org/browser/timeline-blocks/tags/1.1.10/src/blocks/index.php#L343
- https://plugins.trac.wordpress.org/browser/timeline-blocks/trunk/src/blocks/index.php#L200
- https://plugins.trac.wordpress.org/browser/timeline-blocks/trunk/src/blocks/index.php#L202
- https://plugins.trac.wordpress.org/browser/timeline-blocks/trunk/src/blocks/index.php#L342
- https://plugins.trac.wordpress.org/browser/timeline-blocks/trunk/src/blocks/index.php#L343
- https://www.wordfence.com/threat-intel/vulnerabilities/id/393d1b30-19f8-454d-84c0-0b539953e1fe?source=cve
StackPatch runs this match against YOUR installed packages every hour
Free 1-server / $99 lifetime founder seat (50 only) / $19+/mo monthly. Indie pricing.