From this webpage screenshot, the following key information about the vulnerability can be obtained: 1. Vulnerability Name: Gutenberg Page Builder Blocks & Ready-Made Patterns Library <= 3.2.4 - Authenticated (Contributor+) Stored Cross-Site Scripting 2. Vulnerability Type: Cross-site scripting (XSS) vulnerability 3. Affected Scope: Gutenberg Blocks & Patterns for Blogs, Magazines, Business Sites - Post Grids, Sliders, Carousels, Counters, Page Builder & Starter Site Imports, No Coding Needed 4. CVE ID: CVE-2024-8325 5. CVSS Score: 6.4 (Medium) 6. Public Release Date: September 3, 2024 7. Update Date: September 4, 2024 8. Researcher: Francesco Carlucci 9. Fix Status: Fixed 10. Recommended Fix: Upgrade to version 3.2.5 or higher, which includes the patch 11. Affected Versions: <= 3.2.4 12. Fixed Version: 3.2.5 13. Vulnerability Description: The Blockspare plugin fails to properly sanitize input when rendering social sharing blocks, allowing malicious scripts to be injected into the page. 14. Reference Link: plugins.trac.wordpress.org 15. Vulnerability Details: Detailed explanation of the vulnerability’s mechanism, scope, and remediation advice. 16. Copyright and Licensing Information: Includes copyright and licensing details for Defiant Inc. and MITRE Corporation. 17. Vulnerability Database: Wordfence Intelligence’s WordPress vulnerability database is free and accessible via API for querying. 18. Notification Service: Users can receive the latest vulnerability alerts by installing the Wordfence plugin. 19. API and Documentation: Provides API documentation for Wordfence Intelligence to enable querying and utilization of vulnerability data. This information helps users understand the vulnerability in detail and take appropriate security measures to protect their websites.