WordPress Breakdance Plugin <= 1.7.2 is vulnerable to a medium priority Remote Code Execution (RCE)

Medium priority Mitigate with Patchstack
<= 1.7.2Vulnerable version(s)
No official fix availableFixed version
3 Apr, 2024 by Patchstack

Get the fastest vulnerability mitigation with Patchstack!

Get started

Risks

CVSS 9.9

This vulnerability is moderately dangerous and expected to become exploited.

Note by Patchstack

This is not a false positive. The Client Mode "Edit Content" which is meant to grant limited content edit access to users on Breakdance is by default vulnerable to RCE. Regardless of the existing warnings in place, code execution on the lowest permission available is against common access control principles and should not be made possible. Researcher advisory - https://snicco.io/vulnerability-disclosure/breakdance/client-mode-remote-code-execution-breakdance-1-7-0

9.9

Remote Code Execution (RCE)

This could allow a malicious actor to execute commands on the target website. This can be used to gain backdoor access to then take full control of the website.

CVSS score is a way to evaluate and rank reported vulnerabilities in a standardized and repeatable way but which is not ideal for WordPress.

Solutions

We advise to mitigate or resolve the vulnerability immediately.

Automatically mitigate vulnerabilities and keep your websites safe.

Patchstack has issued a mitigation rule to block any attacks until an official fix becomes available, can be tested and be safely applied.

Get the fastest vulnerability mitigation with Patchstack!

Get started

Details

Have additional information or questions about this entry? Let us know.

Timeline

Reported byProfile ImageSnicco

9 Feb, 2024

Early warning sent out to Patchstack customers

3 Apr, 2024

Published by Patchstack

3 Apr, 2024

Weekly WordPress security intelligence delivered to your inbox.