The Popularis Extra plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 1.2.7 via the 'elementor-template' shortcode due to insufficient restrictions on which posts can be included. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract data from private or draft posts created via Elementor that they should not have access to.
                
            Metrics
Affected Vendors & Products
References
        History
                    Sat, 16 Nov 2024 16:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | ssvc 
 | 
Sat, 16 Nov 2024 02:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | The Popularis Extra plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 1.2.7 via the 'elementor-template' shortcode due to insufficient restrictions on which posts can be included. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract data from private or draft posts created via Elementor that they should not have access to. | |
| Title | Popularis Extra <= 1.2.7 - Authenticated (Contributor+) Post Disclosure | |
| Weaknesses | CWE-639 | |
| References |  | |
| Metrics | cvssV3_1 
 | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: Wordfence
Published: 2024-11-16T02:02:27.103Z
Updated: 2024-11-16T15:15:12.408Z
Reserved: 2024-11-04T15:27:06.204Z
Link: CVE-2024-10795
 Vulnrichment
                        Vulnrichment
                    Updated: 2024-11-16T15:14:59.570Z
 NVD
                        NVD
                    Status : Awaiting Analysis
Published: 2024-11-16T03:15:14.737
Modified: 2024-11-18T17:11:17.393
Link: CVE-2024-10795
 Redhat
                        Redhat
                    No data.