The GutenKit – Page Builder Blocks, Patterns, and Templates for Gutenberg Block Editor plugin for WordPress is vulnerable to arbitrary file uploads due to a missing capability check on the install_and_activate_plugin_from_external() function (install-active-plugin REST API endpoint) in all versions up to, and including, 2.1.0. This makes it possible for unauthenticated attackers to install and activate arbitrary plugins, or utilize the functionality to upload arbitrary files spoofed like plugins.
Metrics
Affected Vendors & Products
References
History
Fri, 11 Oct 2024 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Wpmet
Wpmet gutenkit |
|
CPEs | cpe:2.3:a:wpmet:gutenkit:*:*:*:*:*:*:*:* | |
Vendors & Products |
Wpmet
Wpmet gutenkit |
|
Metrics |
ssvc
|
Fri, 11 Oct 2024 07:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The GutenKit – Page Builder Blocks, Patterns, and Templates for Gutenberg Block Editor plugin for WordPress is vulnerable to arbitrary file uploads due to a missing capability check on the install_and_activate_plugin_from_external() function (install-active-plugin REST API endpoint) in all versions up to, and including, 2.1.0. This makes it possible for unauthenticated attackers to install and activate arbitrary plugins, or utilize the functionality to upload arbitrary files spoofed like plugins. | |
Title | GutenKit <= 2.1.0 - Unauthenticated Arbitrary File Upload | |
Weaknesses | CWE-862 | |
References |
|
|
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: Wordfence
Published: 2024-10-11T06:50:20.255Z
Updated: 2024-10-11T16:07:24.463Z
Reserved: 2024-09-26T18:38:27.382Z
Link: CVE-2024-9234
Vulnrichment
Updated: 2024-10-11T16:07:13.082Z
NVD
Status : Awaiting Analysis
Published: 2024-10-11T13:15:18.530
Modified: 2024-10-15T12:58:51.050
Link: CVE-2024-9234
Redhat
No data.