Remote Code Execution Vulnerability in Borderless Plugin for WordPress
CVE-2024-11600
7.2HIGH
Key Information:
- Vendor
- Visualmodo
- Status
- Borderless – Widgets, Elements, Templates And Toolkit For Elementor & Gutenberg
- Vendor
- CVE Published:
- 30 January 2025
Summary
The Borderless plugin for WordPress, specifically the Widgets, Elements, Templates, and Toolkit for Elementor & Gutenberg, is exposed to a Remote Code Execution vulnerability due to insufficient sanitization mechanisms in its 'write_config' function. This flaw allows authenticated users with Administrator privileges to import an unsanitized JSON file, enabling them to execute arbitrary code on the server. Users should ensure they update their plugins to mitigate potential exploitation risks and secure their sites.
Affected Version(s)
Borderless – Widgets, Elements, Templates and Toolkit for Elementor & Gutenberg * <= 1.5.9
References
CVSS V3.1
Score:
7.2
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
anhchangmutrang
Trương Hữu Phúc (truonghuuphuc)