Web Stories Google Web Stories

Do you want an email whenever new security vulnerabilities are reported in Google Web Stories?

By the Year

In 2024 there have been 0 vulnerabilities in Google Web Stories . Last year Web Stories had 1 security vulnerability published. Right now, Web Stories is on track to have less security vulnerabilities in 2024 than it did last year.

Year Vulnerabilities Average Score
2024 0 0.00
2023 1 6.50
2022 1 8.10
2021 0 0.00
2020 0 0.00
2019 0 0.00
2018 0 0.00

It may take a day or so for new Web Stories vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Google Web Stories Security Vulnerabilities

The Web Stories for WordPress plugin supports the WordPress built-in functionality of protecting content with a password

CVE-2023-1979 6.5 - Medium - May 08, 2023

The Web Stories for WordPress plugin supports the WordPress built-in functionality of protecting content with a password. The content is then only accessible to website visitors after entering the password. In WordPress, users with the "Author" role can create stories, but don't have the ability to edit password protected stories. The vulnerability allowed users with said role to bypass this permission check when trying to duplicate the protected story in the plugin's own dashboard, giving them access to the seemingly protected content. We recommend upgrading to version 1.32 or beyond commit  ad49781c2a35c5c92ef704d4b621ab4e5cb77d68 https://github.com/GoogleForCreators/web-stories-wp/commit/ad49781c2a35c5c92ef704d4b621ab4e5cb77d68

AuthZ

The Web Stories plugin for WordPress is vulnerable to Server-Side Request Forgery in versions up to, and including 1.24.0 due to insufficient validation of URLs supplied

CVE-2022-3708 8.1 - High - October 28, 2022

The Web Stories plugin for WordPress is vulnerable to Server-Side Request Forgery in versions up to, and including 1.24.0 due to insufficient validation of URLs supplied via the 'url' parameter found via the /v1/hotlink/proxy REST API Endpoint. This makes it possible for authenticated users to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.

XSPA

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Google Web Stories or by Google? Click the Watch button to subscribe.

Google
Vendor

subscribe