Description
The Build & Control Block Patterns – Boost up Gutenberg Editor plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the settings_export() function in all versions up to, and including, 1.3.5.4. This makes it possible for unauthenticated attackers to export the plugin's settings.
Published: 2024-03-05
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2024-16870 The Build & Control Block Patterns – Boost up Gutenberg Editor plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the settings_export() function in all versions up to, and including, 1.3.5.4. This makes it possible for unauthenticated attackers to export the plugin's settings.
History

Wed, 08 Apr 2026 17:45:00 +0000

Type Values Removed Values Added
Title Build & Control Block Patterns – Boost up Gutenberg Editor <= 1.3.5.4 - Missing Authorization

Wed, 25 Feb 2026 22:15:00 +0000

Type Values Removed Values Added
First Time appeared Razib
Razib build And Control Block Patterns
CPEs cpe:2.3:a:razib_:build_and_control_block_patterns:*:*:*:*:*:*:*:*
Vendors & Products Razib
Razib build And Control Block Patterns
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 08 Jan 2025 18:30:00 +0000

Type Values Removed Values Added
First Time appeared Themeperch
Themeperch build \& Control Block Pattern
Weaknesses CWE-862
CPEs cpe:2.3:a:themeperch:build_\&_control_block_pattern:*:*:*:*:*:wordpress:*:*
Vendors & Products Themeperch
Themeperch build \& Control Block Pattern

Subscriptions

Razib Build And Control Block Patterns
Themeperch Build \& Control Block Pattern
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:46:39.745Z

Reserved: 2024-01-31T01:06:24.751Z

Link: CVE-2024-1095

cve-icon Vulnrichment

Updated: 2024-08-01T18:26:30.565Z

cve-icon NVD

Status : Modified

Published: 2024-03-05T02:15:26.130

Modified: 2026-04-08T18:20:26.800

Link: CVE-2024-1095

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses