The Futurio Extra plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 2.0.13 via the 'elementor-template' shortcode due to insufficient restrictions on which posts can be included. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract data from private or draft posts that they should not have access to.
References
Configurations
History
14 Nov 2024, 19:44
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:futuriowp:futurio_extra:*:*:*:*:*:wordpress:*:* | |
First Time |
Futuriowp futurio Extra
Futuriowp |
|
References | () https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3184380%40futurio-extra&new=3184380%40futurio-extra&sfp_email=&sfph_mail=#file3 - Patch | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/53871750-6437-459f-97e1-5cf524160f09?source=cve - Third Party Advisory |
12 Nov 2024, 13:55
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
12 Nov 2024, 04:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-11-12 04:15
Updated : 2024-11-14 19:44
NVD link : CVE-2024-10695
Mitre link : CVE-2024-10695
CVE.ORG link : CVE-2024-10695
JSON object : View
Products Affected
futuriowp
- futurio_extra
CWE
CWE-639
Authorization Bypass Through User-Controlled Key