Themeum Qubely
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in Themeum Qubely.
By the Year
In 2026 there have been 1 vulnerability in Themeum Qubely. Last year, in 2025 Qubely had 5 security vulnerabilities published. Right now, Qubely is on track to have less security vulnerabilities in 2026 than it did last year.
| Year | Vulnerabilities | Average Score |
|---|---|---|
| 2026 | 1 | 0.00 |
| 2025 | 5 | 4.58 |
| 2024 | 1 | 5.40 |
| 2023 | 1 | 7.50 |
| 2022 | 1 | 6.50 |
It may take a day or so for new Qubely vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Themeum Qubely Security Vulnerabilities
Themeum Qubely <=1.8.14 Stored XSS via Unsanitized Input
CVE-2026-39638
- April 08, 2026
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Themeum Qubely qubely allows Stored XSS.This issue affects Qubely: from n/a through <= 1.8.14.
XSS
Qubely <=1.8.14: Sensitive Data Exposure via Sent Data
CVE-2025-58249
4.3 - Medium
- September 22, 2025
Insertion of Sensitive Information Into Sent Data vulnerability in Themeum Qubely allows Retrieve Embedded Sensitive Data. This issue affects Qubely: from n/a through 1.8.14.
Insertion of Sensitive Information Into Sent Data
Themeum Qubely 1.8.14 Missing Auth via Incorrect ACP Levels
CVE-2025-58663
4.3 - Medium
- September 22, 2025
Missing Authorization vulnerability in Themeum Qubely allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Qubely: from n/a through 1.8.14.
AuthZ
Qubely Advanced Gutenberg Blocks <=1.8.13 SIE via qubely_get_content
CVE-2024-13228
4.3 - Medium
- March 11, 2025
The Qubely Advanced Gutenberg Blocks plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.8.13 via the 'qubely_get_content'. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract sensitive private, pending, scheduled, password-protected, draft, and trashed post data.
Privacy violation
Qubely 1.8.12 Stored XSS via Improper Input Neutralization
CVE-2025-26767
- February 16, 2025
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Themeum Qubely qubely allows Stored XSS.This issue affects Qubely: from n/a through <= 1.8.12.
XSS
Stored XSS in Qubely Gutenberg Blocks 1.8.12 via align/UniqueID
CVE-2024-9601
5.4 - Medium
- February 14, 2025
The Qubely Advanced Gutenberg Blocks plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the align and 'UniqueID' parameter in all versions up to, and including, 1.8.12 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
XSS
Stored XSS in Qubely WP Plugin <1.8.5 Block Options
CVE-2023-0376
5.4 - Medium
- January 16, 2024
The Qubely WordPress plugin before 1.8.5 does not validate and escape some of its block options before outputting them back in a page/post where the block is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
XSS
Qubely WP Plugin 1.8.5 Unauthenticated Email Injection via AJAX
CVE-2021-24916
7.5 - High
- August 07, 2023
The Qubely WordPress plugin before 1.8.6 allows unauthenticated user to send arbitrary e-mails to arbitrary addresses via the qubely_send_form_data AJAX action.
The Qubely WordPress plugin before 1.7.8 does not have authorisation and CSRF check on the qubely_delete_saved_block AJAX action, and does not ensure
CVE-2021-25013
6.5 - Medium
- January 24, 2022
The Qubely WordPress plugin before 1.7.8 does not have authorisation and CSRF check on the qubely_delete_saved_block AJAX action, and does not ensure that the block to be deleted belong to the plugin, as a result, any authenticated users, such as subscriber can delete arbitrary posts
Session Riding
Stay on top of Security Vulnerabilities
Want an email whenever new vulnerabilities are published for Themeum Qubely or by Themeum? Click the Watch button to subscribe.