The Otter Blocks – Gutenberg Blocks, Page Builder for Gutenberg Editor & FSE plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 3.0.6 via the get_image function. This makes it possible for unauthenticated attackers to view arbitrary images on the server, which can contain sensitive information.
References
Configurations
History
14 Jul 2025, 17:37
Type | Values Removed | Values Added |
---|---|---|
First Time |
Themeisle otter Blocks
Themeisle |
|
CPE | cpe:2.3:a:themeisle:otter_blocks:*:*:*:*:*:wordpress:*:* | |
Summary |
|
|
References | () https://plugins.trac.wordpress.org/browser/otter-blocks/tags/3.0.6/inc/plugins/class-dynamic-content.php#L222 - Product | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/c5e9ab63-d61e-40f1-a5cb-432f33dfd2a6?source=cve - Third Party Advisory |
27 Nov 2024, 06:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-11-27 06:15
Updated : 2025-07-14 17:37
NVD link : CVE-2024-11219
Mitre link : CVE-2024-11219
CVE.ORG link : CVE-2024-11219
JSON object : View
Products Affected
themeisle
- otter_blocks
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')