The Build & Control Block Patterns – Boost up Gutenberg Editor plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the settings_export() function in all versions up to, and including, 1.3.5.4. This makes it possible for unauthenticated attackers to export the plugin's settings.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 08 Jan 2025 18:30:00 +0000

Type Values Removed Values Added
First Time appeared Themeperch
Themeperch build \& Control Block Pattern
Weaknesses CWE-862
CPEs cpe:2.3:a:themeperch:build_\&_control_block_pattern:*:*:*:*:*:wordpress:*:*
Vendors & Products Themeperch
Themeperch build \& Control Block Pattern

cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2024-08-26T18:35:45.129Z

Reserved: 2024-01-31T01:06:24.751Z

Link: CVE-2024-1095

cve-icon Vulnrichment

Updated: 2024-08-01T18:26:30.565Z

cve-icon NVD

Status : Analyzed

Published: 2024-03-05T02:15:26.130

Modified: 2025-01-08T18:05:01.880

Link: CVE-2024-1095

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.