WordPress Plugin Vulnerabilities
GutenKit < 2.1.1 - Unauthenticated Arbitrary File Upload
Description
The GutenKit – Page Builder Blocks, Patterns, and Templates for Gutenberg Block Editor plugin for WordPress is vulnerable to arbitrary file uploads due to a missing capability check on the install_and_activate_plugin_from_external() function (install-active-plugin REST API endpoint) in all versions up to, and including, 2.1.0. This makes it possible for unauthenticated attackers to install and activate arbitrary plugins, or utilize the functionality to upload arbitrary files spoofed like plugins.
Affects Plugins
References
Classification
Type
NO AUTHORISATION
OWASP top 10
CWE
CVSS
Miscellaneous
Original Researcher
Sean Murphy
Verified
No
WPVDB ID
Timeline
Publicly Published
2024-10-10 (about 1 year ago)
Added
2024-10-10 (about 1 year ago)
Last Updated
2024-10-11 (about 1 year ago)