The Borderless – Widgets, Elements, Templates and Toolkit for Elementor & Gutenberg plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 1.5.9 via the 'write_config' function. This is due to a lack of sanitization on an imported JSON file. This makes it possible for authenticated attackers, with Administrator-level access and above, to execute code on the server.
References
Configurations
History
31 Jan 2025, 20:02
Type | Values Removed | Values Added |
---|---|---|
First Time |
Visualmodo borderless
Visualmodo |
|
Summary |
|
|
CPE | cpe:2.3:a:visualmodo:borderless:*:*:*:*:*:wordpress:*:* | |
References | () https://plugins.trac.wordpress.org/browser/borderless/tags/1.5.7/includes/icon-manager/icon-manager.php#L249 - Patch | |
References | () https://plugins.trac.wordpress.org/browser/borderless/tags/1.5.7/includes/icon-manager/icon-manager.php#L333 - Patch | |
References | () https://plugins.trac.wordpress.org/browser/borderless/tags/1.5.7/includes/icon-manager/icon-manager.php#L388 - Patch | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/643b8b82-c4e1-4b81-a7e0-aee0f9270702?source=cve - Third Party Advisory |
30 Jan 2025, 14:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-01-30 14:15
Updated : 2025-01-31 20:02
NVD link : CVE-2024-11600
Mitre link : CVE-2024-11600
CVE.ORG link : CVE-2024-11600
JSON object : View
Products Affected
visualmodo
- borderless
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')