CVE-2024-1095

CVSS 3.1 Score 5.3 of 10 (medium)

Details

Published Mar 5, 2024

Summary

CVE-2024-1095: The Build & Control Block Patterns plugin for WordPress, used to boost up the Gutenberg Editor, is affected by a vulnerability that allows unauthenticated attackers to export the plugin's settings. This issue is due to a missing capability check on the settings_export() function, which is present in all versions up to and including 1.3.5.4. The exploitation of this flaw can lead to unauthorized access of sensitive data. WordPress users are advised to update to the latest version of the plugin to mitigate this risk.

Ligh bulbPrevent cyber attacks with Recorded Future by prioritizing and patching critical vulnerabilities being exploited by threat actors targeting your industry. Book your demo to learn more.

Share

Prioritize, Pinpoint, and Act to Prevent Vulnerability Exploits with Recorded Future

Note: This is just a basic overview providing quick insights into CVE-2024-1095 information. Gain full access to comprehensive CVE data, third party vulnerabilities, compromised credentials and more with Recorded Future
  • Gain complete coverage of your cyber, third party, and physical attack surface
  • Proactively mitigate threats before they turn into costly attacks
  • Make fast, effective, data-driven decisions