CVE-2024-10728

The Post Grid Gutenberg Blocks and WordPress Blog Plugin – PostX plugin for WordPress is vulnerable to unauthorized plugin installation/activation due to a missing capability check on the 'install_required_plugin_callback' function in all versions up to, and including, 4.1.16. This makes it possible for authenticated attackers, with Subscriber-level access and above, to install and activate arbitrary plugins which can be leveraged to achieve remote code execution if another vulnerable plugin is installed and activated.
Configurations

Configuration 1 (hide)

cpe:2.3:a:wpxpo:postx:*:*:*:*:*:wordpress:*:*

History

09 Jul 2025, 18:48

Type Values Removed Values Added
References () https://plugins.trac.wordpress.org/browser/ultimate-post/tags/4.1.16/classes/Importer.php#L94 - () https://plugins.trac.wordpress.org/browser/ultimate-post/tags/4.1.16/classes/Importer.php#L94 - Product
References () https://plugins.trac.wordpress.org/browser/ultimate-post/tags/4.1.16/classes/Initialization.php#L330 - () https://plugins.trac.wordpress.org/browser/ultimate-post/tags/4.1.16/classes/Initialization.php#L330 - Product
References () https://plugins.trac.wordpress.org/changeset/3188636/ultimate-post/trunk/classes/Importer.php - () https://plugins.trac.wordpress.org/changeset/3188636/ultimate-post/trunk/classes/Importer.php - Patch
References () https://wordpress.org/plugins/ultimate-post/ - () https://wordpress.org/plugins/ultimate-post/ - Product
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/076f36fb-c2fb-43e0-a027-1351d3995489?source=cve - () https://www.wordfence.com/threat-intel/vulnerabilities/id/076f36fb-c2fb-43e0-a027-1351d3995489?source=cve - Third Party Advisory
First Time Wpxpo postx
Wpxpo
CPE cpe:2.3:a:wpxpo:postx:*:*:*:*:*:wordpress:*:*

18 Nov 2024, 17:11

Type Values Removed Values Added
Summary
  • (es) El complemento Post Grid Gutenberg Blocks and WordPress Blog Plugin – PostX para WordPress es vulnerable a la instalación/activación no autorizada de complementos debido a una falta de verificación de capacidad en la función 'install_required_plugin_callback' en todas las versiones hasta la 4.1.16 incluida. Esto permite que atacantes autenticados, con acceso de nivel de suscriptor y superior, instalen y activen complementos arbitrarios que pueden aprovecharse para lograr la ejecución remota de código si se instala y activa otro complemento vulnerable.

16 Nov 2024, 05:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-11-16 05:15

Updated : 2025-07-09 18:48


NVD link : CVE-2024-10728

Mitre link : CVE-2024-10728

CVE.ORG link : CVE-2024-10728


JSON object : View

Products Affected

wpxpo

  • postx
CWE
CWE-862

Missing Authorization