First published: Sat Jun 01 2024(Updated: )
The Content Blocks (Custom Post Widget) plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 3.3.0 via the plugin's 'content_block' shortcode. This makes it possible for authenticated attackers, with contributor-level access and above, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
WordPress Content Blocks | <=3.3.0 | |
Johan van der Wijk Content Blocks | <3.3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-3564 is classified as a medium severity vulnerability due to its potential for local file inclusion by authenticated attackers.
To fix CVE-2024-3564, update the Content Blocks (Custom Post Widget) plugin to version 3.3.1 or later.
CVE-2024-3564 affects all versions of the Content Blocks (Custom Post Widget) plugin for WordPress up to and including version 3.3.0.
CVE-2024-3564 is a Local File Inclusion vulnerability that allows authenticated attackers to manipulate files on the server.
Exploitation of CVE-2024-3564 requires authenticated access, specifically contributor-level or higher.