CVE-2024-11219

The Otter Blocks – Gutenberg Blocks, Page Builder for Gutenberg Editor & FSE plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 3.0.6 via the get_image function. This makes it possible for unauthenticated attackers to view arbitrary images on the server, which can contain sensitive information.
Configurations

Configuration 1 (hide)

cpe:2.3:a:themeisle:otter_blocks:*:*:*:*:*:wordpress:*:*

History

14 Jul 2025, 17:37

Type Values Removed Values Added
CPE cpe:2.3:a:themeisle:otter_blocks:*:*:*:*:*:wordpress:*:*
First Time Themeisle
Themeisle otter Blocks
References () https://plugins.trac.wordpress.org/browser/otter-blocks/tags/3.0.6/inc/plugins/class-dynamic-content.php#L222 - () https://plugins.trac.wordpress.org/browser/otter-blocks/tags/3.0.6/inc/plugins/class-dynamic-content.php#L222 - Product
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/c5e9ab63-d61e-40f1-a5cb-432f33dfd2a6?source=cve - () https://www.wordfence.com/threat-intel/vulnerabilities/id/c5e9ab63-d61e-40f1-a5cb-432f33dfd2a6?source=cve - Third Party Advisory

Information

Published : 2024-11-27 06:15

Updated : 2025-07-14 17:37


NVD link : CVE-2024-11219

Mitre link : CVE-2024-11219

CVE.ORG link : CVE-2024-11219


JSON object : View

Products Affected

themeisle

  • otter_blocks
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')