CVE-2024-10672

The Multiple Page Generator Plugin – MPG plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the mpg_upsert_project_source_block() function in all versions up to, and including, 4.0.2. This makes it possible for authenticated attackers, with editor-level access and above, to delete limited files on the server.
Configurations

Configuration 1 (hide)

cpe:2.3:a:themeisle:multiple_page_generator:*:*:*:*:*:wordpress:*:*

History

14 Nov 2024, 18:49

Type Values Removed Values Added
CPE cpe:2.3:a:themeisle:multiple_page_generator:*:*:*:*:*:wordpress:*:*
First Time Themeisle multiple Page Generator
Themeisle
CWE CWE-22
References () https://plugins.trac.wordpress.org/browser/multiple-pages-generator-by-porthas/tags/3.4.8/controllers/ProjectController.php#L139 - () https://plugins.trac.wordpress.org/browser/multiple-pages-generator-by-porthas/tags/3.4.8/controllers/ProjectController.php#L139 - Product
References () https://plugins.trac.wordpress.org/browser/multiple-pages-generator-by-porthas/tags/3.4.8/controllers/ProjectController.php#L147 - () https://plugins.trac.wordpress.org/browser/multiple-pages-generator-by-porthas/tags/3.4.8/controllers/ProjectController.php#L147 - Product
References () https://plugins.trac.wordpress.org/changeset/3183330/multiple-pages-generator-by-porthas/tags/4.0.3/controllers/ProjectController.php - () https://plugins.trac.wordpress.org/changeset/3183330/multiple-pages-generator-by-porthas/tags/4.0.3/controllers/ProjectController.php - Patch
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/8c21de03-4d62-4ecf-a2f1-57e0e416792b?source=cve - () https://www.wordfence.com/threat-intel/vulnerabilities/id/8c21de03-4d62-4ecf-a2f1-57e0e416792b?source=cve - Third Party Advisory

12 Nov 2024, 13:55

Type Values Removed Values Added
Summary
  • (es) El complemento Multiple Page Generator Plugin – MPG para WordPress es vulnerable a la eliminación arbitraria de archivos debido a una validación insuficiente de la ruta de archivo en la función mpg_upsert_project_source_block() en todas las versiones hasta la 4.0.2 incluida. Esto permite que atacantes autenticados, con acceso de nivel de editor o superior, eliminen archivos limitados en el servidor.

12 Nov 2024, 04:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-11-12 04:15

Updated : 2024-11-14 18:49


NVD link : CVE-2024-10672

Mitre link : CVE-2024-10672

CVE.ORG link : CVE-2024-10672


JSON object : View

Products Affected

themeisle

  • multiple_page_generator
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

CWE-73

External Control of File Name or Path