CVE-2024-13407

The Omnipress plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 1.5.4 via the megamenu block due to insufficient restrictions on which posts can be included. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract data from password protected, private, or draft posts that they should not have access to.
Configurations

Configuration 1 (hide)

cpe:2.3:a:omnipressteam:omnipress:*:*:*:*:*:wordpress:*:*

History

21 Mar 2025, 14:44

Type Values Removed Values Added
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/fa17f78a-5e4a-441e-bbbb-d13bad648c39?source=cve - () https://www.wordfence.com/threat-intel/vulnerabilities/id/fa17f78a-5e4a-441e-bbbb-d13bad648c39?source=cve - Third Party Advisory
References () https://plugins.trac.wordpress.org/changeset/3254484/omnipress/trunk/includes/Blocks/BlockTypes/Megamenu.php - () https://plugins.trac.wordpress.org/changeset/3254484/omnipress/trunk/includes/Blocks/BlockTypes/Megamenu.php - Patch
CPE cpe:2.3:a:omnipressteam:omnipress:*:*:*:*:*:wordpress:*:*
CVSS v2 : unknown
v3 : 4.3
v2 : unknown
v3 : 6.5
First Time Omnipressteam
Omnipressteam omnipress

14 Mar 2025, 08:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-03-14 08:15

Updated : 2025-03-21 14:44


NVD link : CVE-2024-13407

Mitre link : CVE-2024-13407


JSON object : View

Products Affected

omnipressteam

  • omnipress
CWE
CWE-639

Authorization Bypass Through User-Controlled Key