Remote Code Execution Vulnerability in Borderless Plugin for WordPress
CVE-2024-11600

7.2HIGH

Key Information:

Vendor
Visualmodo
Status
Borderless – Widgets, Elements, Templates And Toolkit For Elementor & Gutenberg
Vendor
CVE Published:
30 January 2025

Summary

The Borderless plugin for WordPress, specifically the Widgets, Elements, Templates, and Toolkit for Elementor & Gutenberg, is exposed to a Remote Code Execution vulnerability due to insufficient sanitization mechanisms in its 'write_config' function. This flaw allows authenticated users with Administrator privileges to import an unsanitized JSON file, enabling them to execute arbitrary code on the server. Users should ensure they update their plugins to mitigate potential exploitation risks and secure their sites.

Affected Version(s)

Borderless – Widgets, Elements, Templates and Toolkit for Elementor & Gutenberg * <= 1.5.9

References

CVSS V3.1

Score:
7.2
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

anhchangmutrang
Trương Hữu Phúc (truonghuuphuc)
.