The Omnipress plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 1.5.4 via the megamenu block due to insufficient restrictions on which posts can be included. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract data from password protected, private, or draft posts that they should not have access to.
History

Fri, 21 Mar 2025 15:00:00 +0000

Type Values Removed Values Added
First Time appeared Omnipressteam
Omnipressteam omnipress
CPEs cpe:2.3:a:omnipressteam:omnipress:*:*:*:*:*:wordpress:*:*
Vendors & Products Omnipressteam
Omnipressteam omnipress

Fri, 14 Mar 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 14 Mar 2025 07:30:00 +0000

Type Values Removed Values Added
Description The Omnipress plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 1.5.4 via the megamenu block due to insufficient restrictions on which posts can be included. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract data from password protected, private, or draft posts that they should not have access to.
Title Omnipress <= 1.5.4 - Authenticated (Contributor+) Post Disclosure
Weaknesses CWE-639
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2025-03-14T13:17:54.738Z

Reserved: 2025-01-15T16:56:27.887Z

Link: CVE-2024-13407

cve-icon Vulnrichment

Updated: 2025-03-14T13:17:50.356Z

cve-icon NVD

Status : Analyzed

Published: 2025-03-14T08:15:11.620

Modified: 2025-03-21T14:44:58.060

Link: CVE-2024-13407

cve-icon Redhat

No data.