CVE-2024-6155

The Greenshift – animation and page builder blocks plugin for WordPress is vulnerable to Authenticated (Subscriber+) Server-Side Request Forgery and Stored Cross Site Scripting in all versions up to, and including, 9.0.0 due to a missing capability check in the greenshift_download_file_localy function, along with no SSRF protection and sanitization on uploaded SVG files. This makes it possible for authenticated attackers, with Subscriber-level access and above, to make web requests to arbitrary locations originating from the web application that can also be leveraged to download malicious SVG files containing Cross-Site Scripting payloads to the server. On Cloud-based servers, attackers could retrieve the instance metadata. The issue was partially patched in version 8.9.9 and fully patched in version 9.0.1.
Configurations

Configuration 1 (hide)

cpe:2.3:a:greenshiftwp:greenshift_-_animation_and_page_builder_blocks:*:*:*:*:*:wordpress:*:*

History

05 Jun 2025, 14:43

Type Values Removed Values Added
References () https://plugins.trac.wordpress.org/browser/greenshift-animation-and-page-builder-blocks/tags/8.9.8/settings.php#L1385 - () https://plugins.trac.wordpress.org/browser/greenshift-animation-and-page-builder-blocks/tags/8.9.8/settings.php#L1385 - Product
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/fe3cfaf4-67c8-47af-bd58-e8ad27a03fae?source=cve - () https://www.wordfence.com/threat-intel/vulnerabilities/id/fe3cfaf4-67c8-47af-bd58-e8ad27a03fae?source=cve - Third Party Advisory
CPE cpe:2.3:a:greenshiftwp:greenshift_-_animation_and_page_builder_blocks:*:*:*:*:*:wordpress:*:*
CWE CWE-79
CWE-918
First Time Greenshiftwp greenshift - Animation And Page Builder Blocks
Greenshiftwp
Summary
  • (es) El complemento Greenshift – animation y page builder blocks para WordPress es vulnerable a Server-Side Request Forgery (SSRF) autenticada (Subscriber+) y a Cross Site Scripting almacenado en todas las versiones hasta la 9.0.0 incluida debido a una comprobación de capacidad faltante en la función greenshift_download_file_localy, junto con la falta de protección SSRF y desinfección de los archivos SVG cargados. Esto permite que los atacantes autenticados, con acceso de nivel de suscriptor y superior, realicen solicitudes web a ubicaciones arbitrarias que se originan en la aplicación web y que también se pueden aprovechar para descargar archivos SVG maliciosos que contienen payloads de Cross Site Scripting al servidor. En servidores basados en la nube, los atacantes podrían recuperar los metadatos de la instancia. El problema se solucionó parcialmente en la versión 8.9.9 y por completo en la versión 9.0.1.

09 Jan 2025, 11:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-01-09 11:15

Updated : 2025-06-05 14:43


NVD link : CVE-2024-6155

Mitre link : CVE-2024-6155

CVE.ORG link : CVE-2024-6155


JSON object : View

Products Affected

greenshiftwp

  • greenshift_-_animation_and_page_builder_blocks
CWE
CWE-862

Missing Authorization

CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

CWE-918

Server-Side Request Forgery (SSRF)