
Cloud Vulnerability DB
A community-led vulnerabilities database
The Button Block WordPress plugin (versions up to 1.1.5) contains a Sensitive Information Exposure vulnerability (CVE-2024-12560). The vulnerability exists in the 'btnblockduplicate_post' function, which allows authenticated attackers with Contributor-level access or higher to extract sensitive data from draft, scheduled, private, and password-protected posts (NVD).
The vulnerability has been assigned a CVSS v3.1 base score of 6.5 (MEDIUM) with the vector string CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N by NVD, while Wordfence assigned a score of 4.3 (MEDIUM) with the vector string CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N. The vulnerability is classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor) (NVD).
When exploited, this vulnerability allows authenticated attackers with Contributor-level privileges or higher to access sensitive information from various types of protected posts, including drafts, scheduled posts, private posts, and password-protected content (NVD).
A patch has been released to address this vulnerability. Users are advised to update their Button Block plugin to a version newer than 1.1.5 (WordPress Plugin).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."