The GenerateBlocks plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.8.2 via Query Loop. This makes it possible for authenticated attackers, with contributor access and above, to see contents of posts and pages in draft or private status as well as those with scheduled publication dates.
References
Configurations
History
12 Mar 2025, 12:18
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:generatepress:generateblocks:*:*:*:*:-:wordpress:*:* | |
First Time |
Generatepress
Generatepress generateblocks |
|
CWE | NVD-CWE-noinfo | |
References | () https://plugins.trac.wordpress.org/browser/generateblocks/trunk/includes/class-query-loop.php#L140 - Product | |
References | () https://plugins.trac.wordpress.org/browser/generateblocks/trunk/includes/class-query-loop.php#L70 - Product | |
References | () https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3041431%40generateblocks%2Ftrunk&old=2995923%40generateblocks%2Ftrunk&sfp_email=&sfph_mail=#file2 - Patch | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/62f19301-2311-4989-a5f2-9f845b72dd54?source=cve - Third Party Advisory |
Information
Published : 2024-03-13 16:15
Updated : 2025-03-12 12:18
NVD link : CVE-2024-1452
Mitre link : CVE-2024-1452
CVE.ORG link : CVE-2024-1452
JSON object : View
Products Affected
generatepress
- generateblocks
CWE