CVE-2021-24546

The Gutenberg Block Editor Toolkit – EditorsKit WordPress plugin before 1.31.6 does not sanitise and validate the Conditional Logic of the Custom Visibility settings, allowing users with a role as low contributor to execute Arbitrary PHP code
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:extendify:editorskit:*:*:*:*:*:wordpress:*:*

History

15 Oct 2021, 16:31

Type Values Removed Values Added
CPE cpe:2.3:a:extendify:editorskit:*:*:*:*:*:wordpress:*:*
References (MISC) https://wpscan.com/vulnerability/bdc36f6a-682d-4d66-b587-92e86085d971 - (MISC) https://wpscan.com/vulnerability/bdc36f6a-682d-4d66-b587-92e86085d971 - Exploit, Third Party Advisory
CVSS v2 : unknown
v3 : unknown
v2 : 6.5
v3 : 8.8

11 Oct 2021, 11:15

Type Values Removed Values Added
New CVE

Information

Published : 2021-10-11 11:15

Updated : 2024-02-04 22:08


NVD link : CVE-2021-24546

Mitre link : CVE-2021-24546

CVE.ORG link : CVE-2021-24546


JSON object : View

Products Affected

extendify

  • editorskit
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')