CVE-2024-11181

The Greenshift – animation and page builder blocks plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 9.9.9.3 via the 'wp_reusable_render' shortcode due to insufficient restrictions on which posts can be included. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract data from password protected, private, or draft posts that they should not have access to.
Configurations

Configuration 1 (hide)

cpe:2.3:a:greenshiftwp:greenshift_-_animation_and_page_builder_blocks:*:*:*:*:*:wordpress:*:*

History

05 Jun 2025, 15:59

Type Values Removed Values Added
CPE cpe:2.3:a:greenshiftwp:greenshift_-_animation_and_page_builder_blocks:*:*:*:*:*:wordpress:*:*
First Time Greenshiftwp
Greenshiftwp greenshift - Animation And Page Builder Blocks
References () https://plugins.trac.wordpress.org/browser/greenshift-animation-and-page-builder-blocks/trunk/settings.php#L1236 - () https://plugins.trac.wordpress.org/browser/greenshift-animation-and-page-builder-blocks/trunk/settings.php#L1236 - Product
References () https://plugins.trac.wordpress.org/browser/greenshift-animation-and-page-builder-blocks/trunk/settings.php#L43 - () https://plugins.trac.wordpress.org/browser/greenshift-animation-and-page-builder-blocks/trunk/settings.php#L43 - Product
References () https://plugins.trac.wordpress.org/changeset/3203829/greenshift-animation-and-page-builder-blocks/trunk/settings.php - () https://plugins.trac.wordpress.org/changeset/3203829/greenshift-animation-and-page-builder-blocks/trunk/settings.php - Patch
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/06047667-2a24-4e1c-9389-11daceff4d23?source=cve - () https://www.wordfence.com/threat-intel/vulnerabilities/id/06047667-2a24-4e1c-9389-11daceff4d23?source=cve - Third Party Advisory
Summary
  • (es) El complemento Greenshift – animation and page builder blocks para WordPress es vulnerable a Information Exposure en todas las versiones hasta la 9.9.9.3 incluida a través del shortcode 'wp_reusable_render' debido a restricciones insuficientes sobre qué publicaciones se pueden incluir. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, extraigan datos de publicaciones protegidas con contraseña, privadas o borradores a los que no deberían tener acceso.

12 Dec 2024, 07:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-12-12 07:15

Updated : 2025-06-05 15:59


NVD link : CVE-2024-11181

Mitre link : CVE-2024-11181

CVE.ORG link : CVE-2024-11181


JSON object : View

Products Affected

greenshiftwp

  • greenshift_-_animation_and_page_builder_blocks
CWE
CWE-639

Authorization Bypass Through User-Controlled Key