The Popularis Extra plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 1.2.7 via the 'elementor-template' shortcode due to insufficient restrictions on which posts can be included. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract data from private or draft posts created via Elementor that they should not have access to.
Metrics
Affected Vendors & Products
References
History
Sat, 16 Nov 2024 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Sat, 16 Nov 2024 02:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The Popularis Extra plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 1.2.7 via the 'elementor-template' shortcode due to insufficient restrictions on which posts can be included. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract data from private or draft posts created via Elementor that they should not have access to. | |
Title | Popularis Extra <= 1.2.7 - Authenticated (Contributor+) Post Disclosure | |
Weaknesses | CWE-639 | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: Wordfence
Published: 2024-11-16T02:02:27.103Z
Updated: 2024-11-16T15:15:12.408Z
Reserved: 2024-11-04T15:27:06.204Z
Link: CVE-2024-10795
Vulnrichment
Updated: 2024-11-16T15:14:59.570Z
NVD
Status : Awaiting Analysis
Published: 2024-11-16T03:15:14.737
Modified: 2024-11-18T17:11:17.393
Link: CVE-2024-10795
Redhat
No data.