Lucene search

K
vulnrichmentWordfenceVULNRICHMENT:CVE-2024-1095
HistoryMar 05, 2024 - 1:55 a.m.

CVE-2024-1095

2024-03-0501:55:59
Wordfence
github.com
3
build & control block patterns
boost up gutenberg editor
wordpress
unauthorized access
data
missing capability check
settings export
unauthenticated attackers
plugin settings

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

AI Score

5.2

Confidence

High

SSVC

Exploitation

none

Automatable

yes

Technical Impact

partial

The Build & Control Block Patterns – Boost up Gutenberg Editor plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the settings_export() function in all versions up to, and including, 1.3.5.4. This makes it possible for unauthenticated attackers to export the plugin’s settings.

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:razib_:build_and_control_block_patterns:*:*:*:*:*:*:*:*"
    ],
    "vendor": "razib_",
    "product": "build_and_control_block_patterns",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "versionType": "custom",
        "lessThanOrEqual": "1.3.5.4"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

AI Score

5.2

Confidence

High

SSVC

Exploitation

none

Automatable

yes

Technical Impact

partial

Related for VULNRICHMENT:CVE-2024-1095