First published: Tue Feb 20 2024(Updated: )
The SKT Page Builder plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'saveSktbuilderPageData' function in all versions up to, and including, 4.1. This makes it possible for authenticated attackers, with subscriber access and above, to inject arbitrary content into pages.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
SKT Page Builder | <=4.1 | |
Skt Templates WordPress | <4.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-1337 has a high severity rating due to the potential for unauthorized data modification by authenticated attackers.
To fix CVE-2024-1337, update the SKT Page Builder plugin to version 4.2 or later, where the vulnerability is addressed.
Users of the SKT Page Builder plugin for WordPress versions up to and including 4.1 are affected by CVE-2024-1337.
CVE-2024-1337 is an unauthorized data modification vulnerability due to a missing capability check.
Yes, authenticated attackers with subscriber access and above can exploit CVE-2024-1337 to modify data.