First published: Tue Mar 12 2024(Updated: )
The Post Grid Combo – 36+ Gutenberg Blocks plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.2.68 via the 'get_posts' REST API Endpoint. This makes it possible for unauthenticated attackers to extract sensitive data including full draft posts and password protected posts, as well as the password for password-protected posts.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
PickPlugins Post Grid Combo | <2.2.69 | |
Post Grid | <=2.2.68 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-7072 is classified as a moderate severity vulnerability due to its potential for sensitive information exposure.
To remediate CVE-2023-7072, update the Post Grid Combo plugin to version 2.2.69 or later.
All versions of the Post Grid Combo plugin for WordPress up to and including version 2.2.68 are affected by CVE-2023-7072.
CVE-2023-7072 is a vulnerability that leads to sensitive information exposure through the 'get_posts' REST API endpoint.
CVE-2023-7072 can allow unauthenticated attackers to access sensitive data, including full draft posts.