Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-24546— EditorsKit < 1.31.6 - Contributor+ Arbitrary PHP Code Execution

EPSS 0.97% · P77
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2021-24546

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
EditorsKit < 1.31.6 - Contributor+ Arbitrary PHP Code Execution
Source: NVD (National Vulnerability Database)
Vulnerability Description
The Gutenberg Block Editor Toolkit – EditorsKit WordPress plugin before 1.31.6 does not sanitise and validate the Conditional Logic of the Custom Visibility settings, allowing users with a role as low contributor to execute Arbitrary PHP code
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
对生成代码的控制不恰当(代码注入)
Source: NVD (National Vulnerability Database)
Vulnerability Title
WordPress 插件 代码注入漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
WordPress 插件是WordPress开源的一个应用插件。 WordPress 插件 存在代码注入漏洞,该漏洞源于 Gutenberg Block Editor Toolkit – EditorsKit 插件在 1.31.6 版本之前不清理和验证自定义可见性设置的条件逻辑,允许具有低权限用户执行任意 PHP 代码。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
UnknownGutenberg Block Editor Toolkit – EditorsKit 1.31.6 ~ 1.31.6 -

II. Public POCs for CVE-2021-24546

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2021-24546

登录查看更多情报信息。

Same Patch Batch · Unknown · 2021-10-11 · 17 CVEs total

CVE-2021-24737Comments - wpDiscuz <= 7.3.0 - Admin+ Stored Cross-Site Scripting
CVE-2021-24720GeoDirectory < 2.1.1.3 - Authenticated Stored Cross-Site Scripting (XSS)
CVE-2021-24719Enfold Theme < 4.8.4 - Reflected Cross-Site Scripting (XSS)
CVE-2021-24712Appointment Hour Booking – WordPress Booking Plugin < 1.3.17 - Authenticated Stored XSS
CVE-2021-24711Software License Manager < 4.5.1 - Arbitrary Domain Deletion via CSRF
CVE-2021-24709Weather Effect < 1.3.6 - Admin+ Stored Cross-Site Scripting
CVE-2021-24691Quiz And Survey Master < 7.3.2 - Admin+ Stored Cross-Site Scripting
CVE-2021-24690Chained Quiz < 1.2.7.2 - Authenticated Stored Cross Site Scripting
CVE-2021-24683Weather Effect < 1.3.4 - CSRF to Stored Cross-Site Scripting
CVE-2021-24681Duplicate Page <= 4.4.2 - Admin+ Stored Cross-Site Scripting
CVE-2021-24656Simple Social Media Share Buttons < 3.2.4 - Authenticated Stored Cross-Site Scripting
CVE-2021-24651Poll Maker < 3.4.2 - Unauthenticated Time Based SQL Injection
CVE-2021-24577Coming Soon and Maintenance Mode < 3.5.3 - Authenticated Stored XSS
CVE-2021-24576Easy Accordion < 2.0.22 - Authenticated Stored XSS
CVE-2021-24563Frontend Uploader <= 1.3.2 - Unauthenticated Stored Cross-Site Scripting
CVE-2021-24545WP HTML Author Bio <= 1.2.0 - Author+ Stored Cross-Site Scripting

IV. Related Vulnerabilities

V. Comments for CVE-2021-24546

No comments yet


Leave a comment