The Post Grid Gutenberg Blocks and WordPress Blog Plugin – PostX plugin for WordPress is vulnerable to unauthorized plugin installation/activation due to a missing capability check on the 'install_required_plugin_callback' function in all versions up to, and including, 4.1.16. This makes it possible for authenticated attackers, with Subscriber-level access and above, to install and activate arbitrary plugins which can be leveraged to achieve remote code execution if another vulnerable plugin is installed and activated.
References
Configurations
History
09 Jul 2025, 18:48
Type | Values Removed | Values Added |
---|---|---|
First Time |
Wpxpo
Wpxpo postx |
|
CPE | cpe:2.3:a:wpxpo:postx:*:*:*:*:*:wordpress:*:* | |
References | () https://plugins.trac.wordpress.org/browser/ultimate-post/tags/4.1.16/classes/Importer.php#L94 - Product | |
References | () https://plugins.trac.wordpress.org/browser/ultimate-post/tags/4.1.16/classes/Initialization.php#L330 - Product | |
References | () https://plugins.trac.wordpress.org/changeset/3188636/ultimate-post/trunk/classes/Importer.php - Patch | |
References | () https://wordpress.org/plugins/ultimate-post/ - Product | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/076f36fb-c2fb-43e0-a027-1351d3995489?source=cve - Third Party Advisory |
Information
Published : 2024-11-16 05:15
Updated : 2025-07-09 18:48
NVD link : CVE-2024-10728
Mitre link : CVE-2024-10728
CVE.ORG link : CVE-2024-10728
JSON object : View
Products Affected
wpxpo
- postx
CWE
CWE-862
Missing Authorization