cve/2024/CVE-2024-13798.md
2025-09-29 21:09:30 +02:00

19 lines
981 B
Markdown
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

### [CVE-2024-13798](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-13798)
![](https://img.shields.io/static/v1?label=Product&message=Post%20Grid%20and%20Gutenberg%20Blocks%20%E2%80%93%20ComboBlocks&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=*%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-20%20Improper%20Input%20Validation&color=brightgreen)
### Description
The Post Grid and Gutenberg Blocks ComboBlocks plugin for WordPress is vulnerable to unauthorized order creation in all versions up to, and including, 2.3.5. This is due to insufficient verification on form fields. This makes it possible for unauthenticated attackers to create new orders for products and mark them as paid without actually completing a payment.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/20142995/nuclei-templates
- https://github.com/cyb3r-w0lf/nuclei-template-collection