Overview
- Description
- The Futurio Extra plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 2.0.13 via the 'elementor-template' shortcode due to insufficient restrictions on which posts can be included. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract data from private or draft posts that they should not have access to.
- Source
- security@wordfence.com
- NVD status
- Analyzed
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 4.3
- Impact score
- 1.4
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
- Severity
- MEDIUM
Social media
- Hype score
- Not currently trending
🚨 CVE-2024-10695 (Published: 2024-11-12) - High severity vulnerability in Futuriowp. Affects specific versions of the plugin. Ensure you update to the latest version to mitigate risks. For more details, check the changeset: https://t.co/OnFBmtuX7V
@transilienceai
13 Nov 2024
13 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 CVE-2024-10695 (Published: 2024-11-12) - A high-severity vulnerability in Futuriowp affects multiple versions. Users are urged to update to the latest version immediately to mitigate risks. For more details, check the changeset: https://t.co/OnFBmtuX7V
@transilienceai
13 Nov 2024
12 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2024-10695 The Futurio Extra plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 2.0.13 via the 'elementor-template' shortcode due t… https://t.co/O7SgSk8GAH
@CVEnew
12 Nov 2024
311 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:futuriowp:futurio_extra:*:*:*:*:*:wordpress:*:*", "vulnerable": true, "matchCriteriaId": "2895B55C-CE63-44E6-9CEE-B65A396E8DDC", "versionEndExcluding": "2.0.14" } ], "operator": "OR" } ] } ]