Vulnerability Details CVE-2024-7418
The The Post Grid – Shortcode, Gutenberg Blocks and Elementor Addon for Post Grid plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 7.7.11 via the post_query_guten and post_query functions. This makes it possible for authenticated attackers, with contributor-level access and above, to extract information from posts that are not public (i.e. draft, future, etc..).
Exploit prediction scoring system (EPSS) score
EPSS Score 0.002
EPSS Ranking 43.0%
CVSS Severity
CVSS v3 Score 4.3
Products affected by CVE-2024-7418
-
cpe:2.3:a:radiustheme:the_post_grid:-
-
cpe:2.3:a:radiustheme:the_post_grid:2.3.6.5
-
cpe:2.3:a:radiustheme:the_post_grid:2.3.6.6
-
cpe:2.3:a:radiustheme:the_post_grid:3.0.0
-
cpe:2.3:a:radiustheme:the_post_grid:3.0.1
-
cpe:2.3:a:radiustheme:the_post_grid:3.0.2
-
cpe:2.3:a:radiustheme:the_post_grid:3.0.3
-
cpe:2.3:a:radiustheme:the_post_grid:3.0.4
-
cpe:2.3:a:radiustheme:the_post_grid:3.0.5
-
cpe:2.3:a:radiustheme:the_post_grid:3.1.0
-
cpe:2.3:a:radiustheme:the_post_grid:3.1.1
-
cpe:2.3:a:radiustheme:the_post_grid:3.1.2
-
cpe:2.3:a:radiustheme:the_post_grid:3.1.3
-
cpe:2.3:a:radiustheme:the_post_grid:3.1.4
-
cpe:2.3:a:radiustheme:the_post_grid:3.1.5
-
cpe:2.3:a:radiustheme:the_post_grid:4.0.0
-
cpe:2.3:a:radiustheme:the_post_grid:4.0.1
-
cpe:2.3:a:radiustheme:the_post_grid:4.0.2
-
cpe:2.3:a:radiustheme:the_post_grid:4.0.3
-
cpe:2.3:a:radiustheme:the_post_grid:4.0.4
-
cpe:2.3:a:radiustheme:the_post_grid:4.0.5
-
cpe:2.3:a:radiustheme:the_post_grid:4.1.0
-
cpe:2.3:a:radiustheme:the_post_grid:4.1.1
-
cpe:2.3:a:radiustheme:the_post_grid:4.1.2
-
cpe:2.3:a:radiustheme:the_post_grid:4.1.3
-
cpe:2.3:a:radiustheme:the_post_grid:4.1.4
-
cpe:2.3:a:radiustheme:the_post_grid:4.1.5
-
cpe:2.3:a:radiustheme:the_post_grid:4.2.0
-
cpe:2.3:a:radiustheme:the_post_grid:4.2.1
-
cpe:2.3:a:radiustheme:the_post_grid:4.2.2
-
cpe:2.3:a:radiustheme:the_post_grid:4.2.3
-
cpe:2.3:a:radiustheme:the_post_grid:5.0.0
-
cpe:2.3:a:radiustheme:the_post_grid:5.0.1
-
cpe:2.3:a:radiustheme:the_post_grid:5.0.2
-
cpe:2.3:a:radiustheme:the_post_grid:5.0.3
-
cpe:2.3:a:radiustheme:the_post_grid:5.0.4
-
cpe:2.3:a:radiustheme:the_post_grid:5.0.5
-
cpe:2.3:a:radiustheme:the_post_grid:6.0.0
-
cpe:2.3:a:radiustheme:the_post_grid:6.1.3
-
cpe:2.3:a:radiustheme:the_post_grid:7.0.0
-
cpe:2.3:a:radiustheme:the_post_grid:7.0.1
-
cpe:2.3:a:radiustheme:the_post_grid:7.0.2
-
cpe:2.3:a:radiustheme:the_post_grid:7.1.0
-
cpe:2.3:a:radiustheme:the_post_grid:7.2.0
-
cpe:2.3:a:radiustheme:the_post_grid:7.2.1
-
cpe:2.3:a:radiustheme:the_post_grid:7.2.10
-
cpe:2.3:a:radiustheme:the_post_grid:7.2.11
-
cpe:2.3:a:radiustheme:the_post_grid:7.2.2
-
cpe:2.3:a:radiustheme:the_post_grid:7.2.3
-
cpe:2.3:a:radiustheme:the_post_grid:7.2.4
-
cpe:2.3:a:radiustheme:the_post_grid:7.2.5
-
cpe:2.3:a:radiustheme:the_post_grid:7.2.6
-
cpe:2.3:a:radiustheme:the_post_grid:7.2.7
-
cpe:2.3:a:radiustheme:the_post_grid:7.2.8
-
cpe:2.3:a:radiustheme:the_post_grid:7.2.9
-
cpe:2.3:a:radiustheme:the_post_grid:7.3.0
-
cpe:2.3:a:radiustheme:the_post_grid:7.3.1
-
cpe:2.3:a:radiustheme:the_post_grid:7.4.0
-
cpe:2.3:a:radiustheme:the_post_grid:7.4.1
-
cpe:2.3:a:radiustheme:the_post_grid:7.4.2
-
cpe:2.3:a:radiustheme:the_post_grid:7.4.3
-
cpe:2.3:a:radiustheme:the_post_grid:7.5.0
-
cpe:2.3:a:radiustheme:the_post_grid:7.6.0
-
cpe:2.3:a:radiustheme:the_post_grid:7.6.1
-
cpe:2.3:a:radiustheme:the_post_grid:7.7.0
-
cpe:2.3:a:radiustheme:the_post_grid:7.7.1
-
cpe:2.3:a:radiustheme:the_post_grid:7.7.10
-
cpe:2.3:a:radiustheme:the_post_grid:7.7.11
-
cpe:2.3:a:radiustheme:the_post_grid:7.7.2
-
cpe:2.3:a:radiustheme:the_post_grid:7.7.3
-
cpe:2.3:a:radiustheme:the_post_grid:7.7.4
-
cpe:2.3:a:radiustheme:the_post_grid:7.7.5
-
cpe:2.3:a:radiustheme:the_post_grid:7.7.6
-
cpe:2.3:a:radiustheme:the_post_grid:7.7.7
-
cpe:2.3:a:radiustheme:the_post_grid:7.7.8
-
cpe:2.3:a:radiustheme:the_post_grid:7.7.9