The Build & Control Block Patterns – Boost up Gutenberg Editor plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the settings_export() function in all versions up to, and including, 1.3.5.4. This makes it possible for unauthenticated attackers to export the plugin's settings.
CVSS
No CVSS.
References
Configurations
History
08 Jan 2025, 18:05
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/38f09a45-2b11-47c7-af16-c7f9c3a46e0e?source=cve - Third Party Advisory | |
References | () https://plugins.trac.wordpress.org/browser/control-block-patterns/trunk/classes/Settings/SettingsPage.php#L166 - Product | |
CWE | CWE-862 | |
First Time |
Themeperch build \& Control Block Pattern
Themeperch |
|
CPE | cpe:2.3:a:themeperch:build_\&_control_block_pattern:*:*:*:*:*:wordpress:*:* |
05 Mar 2024, 02:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-03-05 02:15
Updated : 2025-01-08 18:05
NVD link : CVE-2024-1095
Mitre link : CVE-2024-1095
JSON object : View
Products Affected
themeperch
- build_\&_control_block_pattern
CWE
CWE-862
Missing Authorization