First published: Thu May 30 2024(Updated: )
The Post Grid Gutenberg Blocks and WordPress Blog Plugin – PostX plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'postx_presets_callback' function in all versions up to, and including, 4.1.2. This makes it possible for authenticated attackers, with Contributor-level access and above, to change arbitrary options on affected sites. This can be used to enable new user registration and set the default role for new users to Administrator.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
PostX | <=4.1.2 | |
WordPress |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-5326 is considered a high-severity vulnerability due to unauthorized data modification risks.
To fix CVE-2024-5326, update the PostX plugin to the latest version beyond 4.1.2.
CVE-2024-5326 affects all versions of the PostX plugin up to and including 4.1.2.
CVE-2024-5326 could allow unauthorized users to modify site data, jeopardizing site integrity.
Currently, the best workaround for CVE-2024-5326 is to disable the PostX plugin until it is updated.