Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2023-40211

Severity
7.5HIGH
EPSS
36.8%
top 2.85%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedNov 30

Description

Exposure of Sensitive Information to an Unauthorized Actor vulnerability in PickPlugins Post Grid Combo – 36+ Gutenberg Blocks.This issue affects Post Grid Combo – 36+ Gutenberg Blocks: from n/a through 2.2.50.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:NExploitability: 3.9 | Impact: 3.6

Affected Packages2 packages

🔴Vulnerability Details

3
GHSA
GHSA-j6r2-rpgf-7h3f: Exposure of Sensitive Information to an Unauthorized Actor vulnerability in PickPlugins Post Grid Combo – 36+ Gutenberg Blocks2023-11-30
CVEList
WordPress Post Grid Plugin <= 2.2.50 is vulnerable to Sensitive Data Exposure2023-11-30
VulnCheck
PickPlugins Post Grid Combo - 36+ Gutenberg Blocks Vulnerability2023

💥Exploits & PoCs

1
Nuclei
Post Grid <= 2.2.50 - Information Exposure via REST API
CVE-2023-40211 (HIGH CVSS 7.5) | Exposure of Sensitive Information t | cvebase.io