The Greenshift – animation and page builder blocks plugin for WordPress is vulnerable to Authenticated (Subscriber+) Server-Side Request Forgery and Stored Cross Site Scripting in all versions up to, and including, 9.0.0 due to a missing capability check in the greenshift_download_file_localy function, along with no SSRF protection and sanitization on uploaded SVG files. This makes it possible for authenticated attackers, with Subscriber-level access and above, to make web requests to arbitrary locations originating from the web application that can also be leveraged to download malicious SVG files containing Cross-Site Scripting payloads to the server. On Cloud-based servers, attackers could retrieve the instance metadata. The issue was partially patched in version 8.9.9 and fully patched in version 9.0.1.
                
            Metrics
Affected Vendors & Products
References
        History
                    Thu, 05 Jun 2025 15:00:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | Greenshiftwp Greenshiftwp greenshift - Animation And Page Builder Blocks | |
| Weaknesses | CWE-79 CWE-918 | |
| CPEs | cpe:2.3:a:greenshiftwp:greenshift_-_animation_and_page_builder_blocks:*:*:*:*:*:wordpress:*:* | |
| Vendors & Products | Greenshiftwp Greenshiftwp greenshift - Animation And Page Builder Blocks | 
Thu, 09 Jan 2025 15:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | ssvc 
 | 
Thu, 09 Jan 2025 11:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | The Greenshift – animation and page builder blocks plugin for WordPress is vulnerable to Authenticated (Subscriber+) Server-Side Request Forgery and Stored Cross Site Scripting in all versions up to, and including, 9.0.0 due to a missing capability check in the greenshift_download_file_localy function, along with no SSRF protection and sanitization on uploaded SVG files. This makes it possible for authenticated attackers, with Subscriber-level access and above, to make web requests to arbitrary locations originating from the web application that can also be leveraged to download malicious SVG files containing Cross-Site Scripting payloads to the server. On Cloud-based servers, attackers could retrieve the instance metadata. The issue was partially patched in version 8.9.9 and fully patched in version 9.0.1. | |
| Title | Greenshift – animation and page builder blocks <= 9.0.0 - Missing Authorization to Authenticated (Subscriber+) Server-Side Request Forgery and Stored Cross-Site Scripting | |
| Weaknesses | CWE-862 | |
| References |  | |
| Metrics | cvssV3_1 
 | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: Wordfence
Published: 2025-01-09T11:11:05.245Z
Updated: 2025-01-09T14:25:44.448Z
Reserved: 2024-06-18T21:57:36.542Z
Link: CVE-2024-6155
 Vulnrichment
                        Vulnrichment
                    Updated: 2025-01-09T14:25:39.737Z
 NVD
                        NVD
                    Status : Analyzed
Published: 2025-01-09T11:15:16.330
Modified: 2025-06-05T14:43:06.480
Link: CVE-2024-6155
 Redhat
                        Redhat
                    No data.