First published: Sat Nov 16 2024(Updated: )
The Post Grid Gutenberg Blocks and WordPress Blog Plugin – PostX plugin for WordPress is vulnerable to unauthorized plugin installation/activation due to a missing capability check on the 'install_required_plugin_callback' function in all versions up to, and including, 4.1.16. This makes it possible for authenticated attackers, with Subscriber-level access and above, to install and activate arbitrary plugins which can be leveraged to achieve remote code execution if another vulnerable plugin is installed and activated.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
PostX | <=4.1.16 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-10728 is considered to be high due to the potential for unauthorized plugin installations.
To fix CVE-2024-10728, upgrade the PostX plugin to version 4.1.17 or later, which includes a capability check for plugin installations.
CVE-2024-10728 affects all versions of the PostX plugin up to and including 4.1.16.
Yes, CVE-2024-10728 can be exploited remotely if an attacker gains access to the WordPress site's plugin installation capabilities.
Yes, a patch is available in the updated version of the PostX plugin released after 4.1.16.