9.8
CVE-2024-9234
- EPSS 92.95%
- Veröffentlicht 11.10.2024 13:15:18
- Zuletzt bearbeitet 15.10.2024 12:58:51
- Quelle security@wordfence.com
- CVE-Watchlists
- Unerledigt
GutenKit <= 2.1.0 - Unauthenticated Arbitrary File Upload
The GutenKit – Page Builder Blocks, Patterns, and Templates for Gutenberg Block Editor plugin for WordPress is vulnerable to arbitrary file uploads due to a missing capability check on the install_and_activate_plugin_from_external() function (install-active-plugin REST API endpoint) in all versions up to, and including, 2.1.0. This makes it possible for unauthenticated attackers to install and activate arbitrary plugins, or utilize the functionality to upload arbitrary files spoofed like plugins.
Mögliche Gegenmaßnahme
GutenKit – Page Builder Blocks, Patterns, and Templates for Gutenberg Block Editor: Update to version 2.1.1, or a newer patched version
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Weitere Schwachstelleninformationen
SystemWordPress Plugin
≫
Produkt
GutenKit – Page Builder Blocks, Patterns, and Templates for Gutenberg Block Editor
Version
*-2.1.0
Daten sind bereitgestellt durch das CVE Programm von Authorized Data Publishers (ADP) (Unstrukturiert)
Herstellerwpmet
≫
Produkt
gutenkit
Default Statusunknown
Version <=
2.1.0
Version
0
Status
affected
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 92.95% | 0.998 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| security@wordfence.com | 9.8 | 3.9 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
CWE-862 Missing Authorization
The product does not perform an authorization check when an actor attempts to access a resource or perform an action.