First published: Thu May 02 2024(Updated: )
The Spectra – WordPress Gutenberg Blocks plugin for WordPress is vulnerable to Path Traversal in versions up to, and including, 2.12.6 via the get_block_default_attributes function. This allows authenticated attackers, with contributor-level permissions and above, to read the contents of any files named attributes.php on the server, which can contain sensitive information.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Brainstorm Force Spectra | <2.12.7 | |
Spectra WordPress Gutenberg Blocks | <=2.12.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-3107 has a moderate severity level due to its potential impact on file security when exploited.
To fix CVE-2024-3107, update the Spectra – WordPress Gutenberg Blocks plugin to version 2.12.7 or higher.
CVE-2024-3107 affects users of the Spectra – WordPress Gutenberg Blocks plugin versions up to and including 2.12.6.
CVE-2024-3107 is associated with a Path Traversal attack that allows unauthorized file access.
Authenticated users with contributor-level permissions and above can exploit CVE-2024-3107.