CVE-2024-13228

The Qubely – Advanced Gutenberg Blocks plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.8.13 via the 'qubely_get_content'. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract sensitive private, pending, scheduled, password-protected, draft, and trashed post data.
Configurations

Configuration 1 (hide)

cpe:2.3:a:themeum:qubely:*:*:*:*:*:wordpress:*:*

History

26 May 2025, 02:31

Type Values Removed Values Added
Summary
  • (es) El complemento Qubely – Advanced Gutenberg Blocks para WordPress es vulnerable a la exposición de información confidencial en todas las versiones hasta la 1.8.13 incluida a través de 'qubely_get_content'. Esto permite que atacantes autenticados, con acceso de nivel de colaborador o superior, extraigan datos confidenciales de publicaciones privadas, pendientes, programadas, protegidas con contraseña, borradores y eliminadas.
References () https://plugins.trac.wordpress.org/browser/qubely/trunk/core/QUBELY.php#L1172 - () https://plugins.trac.wordpress.org/browser/qubely/trunk/core/QUBELY.php#L1172 - Product
References () https://plugins.trac.wordpress.org/changeset/3253223/ - () https://plugins.trac.wordpress.org/changeset/3253223/ - Patch
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/72c66e71-dddb-4142-ae13-da3caffd8714?source=cve - () https://www.wordfence.com/threat-intel/vulnerabilities/id/72c66e71-dddb-4142-ae13-da3caffd8714?source=cve - Third Party Advisory
First Time Themeum qubely
Themeum
CWE NVD-CWE-Other
CPE cpe:2.3:a:themeum:qubely:*:*:*:*:*:wordpress:*:*

11 Mar 2025, 07:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-03-11 07:15

Updated : 2025-05-26 02:31


NVD link : CVE-2024-13228

Mitre link : CVE-2024-13228

CVE.ORG link : CVE-2024-13228


JSON object : View

Products Affected

themeum

  • qubely
CWE
CWE-359

Exposure of Private Personal Information to an Unauthorized Actor

NVD-CWE-Other