Remote Code Execution Vulnerability in Borderless Plugin for WordPress
CVE-2024-11600

7.2HIGH

Key Information:

Summary

The Borderless plugin for WordPress, specifically the Widgets, Elements, Templates, and Toolkit for Elementor & Gutenberg, is exposed to a Remote Code Execution vulnerability due to insufficient sanitization mechanisms in its 'write_config' function. This flaw allows authenticated users with Administrator privileges to import an unsanitized JSON file, enabling them to execute arbitrary code on the server. Users should ensure they update their plugins to mitigate potential exploitation risks and secure their sites.

Affected Version(s)

Borderless – Widgets, Elements, Templates and Toolkit for Elementor & Gutenberg * <= 1.5.9

References

CVSS V3.1

Score:
7.2
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

anhchangmutrang
Trương Hữu Phúc (truonghuuphuc)
.