CVE-2024-1452

The GenerateBlocks plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.8.2 via Query Loop. This makes it possible for authenticated attackers, with contributor access and above, to see contents of posts and pages in draft or private status as well as those with scheduled publication dates.
Configurations

Configuration 1 (hide)

cpe:2.3:a:generatepress:generateblocks:*:*:*:*:-:wordpress:*:*

History

12 Mar 2025, 12:18

Type Values Removed Values Added
CWE NVD-CWE-noinfo
CPE cpe:2.3:a:generatepress:generateblocks:*:*:*:*:-:wordpress:*:*
First Time Generatepress
Generatepress generateblocks
References () https://plugins.trac.wordpress.org/browser/generateblocks/trunk/includes/class-query-loop.php#L140 - () https://plugins.trac.wordpress.org/browser/generateblocks/trunk/includes/class-query-loop.php#L140 - Product
References () https://plugins.trac.wordpress.org/browser/generateblocks/trunk/includes/class-query-loop.php#L70 - () https://plugins.trac.wordpress.org/browser/generateblocks/trunk/includes/class-query-loop.php#L70 - Product
References () https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3041431%40generateblocks%2Ftrunk&old=2995923%40generateblocks%2Ftrunk&sfp_email=&sfph_mail=#file2 - () https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3041431%40generateblocks%2Ftrunk&old=2995923%40generateblocks%2Ftrunk&sfp_email=&sfph_mail=#file2 - Patch
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/62f19301-2311-4989-a5f2-9f845b72dd54?source=cve - () https://www.wordfence.com/threat-intel/vulnerabilities/id/62f19301-2311-4989-a5f2-9f845b72dd54?source=cve - Third Party Advisory

21 Nov 2024, 08:50

Type Values Removed Values Added
References () https://plugins.trac.wordpress.org/browser/generateblocks/trunk/includes/class-query-loop.php#L140 - () https://plugins.trac.wordpress.org/browser/generateblocks/trunk/includes/class-query-loop.php#L140 -
References () https://plugins.trac.wordpress.org/browser/generateblocks/trunk/includes/class-query-loop.php#L70 - () https://plugins.trac.wordpress.org/browser/generateblocks/trunk/includes/class-query-loop.php#L70 -
References () https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3041431%40generateblocks%2Ftrunk&old=2995923%40generateblocks%2Ftrunk&sfp_email=&sfph_mail=#file2 - () https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3041431%40generateblocks%2Ftrunk&old=2995923%40generateblocks%2Ftrunk&sfp_email=&sfph_mail=#file2 -
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/62f19301-2311-4989-a5f2-9f845b72dd54?source=cve - () https://www.wordfence.com/threat-intel/vulnerabilities/id/62f19301-2311-4989-a5f2-9f845b72dd54?source=cve -
Summary
  • (es) El complemento GenerateBlocks para WordPress es vulnerable a la exposición de información confidencial en todas las versiones hasta la 1.8.2 incluida a través de Query Loop. Esto hace posible que los atacantes autenticados, con acceso de colaborador y superior, vean el contenido de publicaciones y páginas en estado de borrador o privado, así como aquellas con fechas de publicación programadas.

13 Mar 2024, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-03-13 16:15

Updated : 2025-03-12 12:18


NVD link : CVE-2024-1452

Mitre link : CVE-2024-1452

CVE.ORG link : CVE-2024-1452


JSON object : View

Products Affected

generatepress

  • generateblocks