Description
The GutenKit – Page Builder Blocks, Patterns, and Templates for Gutenberg Block Editor plugin for WordPress is vulnerable to arbitrary file uploads due to a missing capability check on the install_and_activate_plugin_from_external() function (install-active-plugin REST API endpoint) in all versions up to, and including, 2.1.0. This makes it possible for unauthenticated attackers to install and activate arbitrary plugins, or utilize the functionality to upload arbitrary files spoofed like plugins.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
No advisories yet.
References
History
Fri, 11 Oct 2024 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wpmet
Wpmet gutenkit |
|
| CPEs | cpe:2.3:a:wpmet:gutenkit:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Wpmet
Wpmet gutenkit |
|
| Metrics |
ssvc
|
Fri, 11 Oct 2024 07:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The GutenKit – Page Builder Blocks, Patterns, and Templates for Gutenberg Block Editor plugin for WordPress is vulnerable to arbitrary file uploads due to a missing capability check on the install_and_activate_plugin_from_external() function (install-active-plugin REST API endpoint) in all versions up to, and including, 2.1.0. This makes it possible for unauthenticated attackers to install and activate arbitrary plugins, or utilize the functionality to upload arbitrary files spoofed like plugins. | |
| Title | GutenKit <= 2.1.0 - Unauthenticated Arbitrary File Upload | |
| Weaknesses | CWE-862 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-04-08T17:29:33.133Z
Reserved: 2024-09-26T18:38:27.382Z
Link: CVE-2024-9234
Updated: 2024-10-11T16:07:13.082Z
Status : Deferred
Published: 2024-10-11T13:15:18.530
Modified: 2026-04-15T00:35:42.020
Link: CVE-2024-9234
No data.
OpenCVE Enrichment
No data.
Weaknesses