CVE-2023-40211

WordPress Post Grid Plugin <= 2.2.50 is vulnerable to Sensitive Data Exposure

Exposure of Sensitive Information to an Unauthorized Actor vulnerability in PickPlugins Post Grid Combo – 36+ Gutenberg Blocks.This issue affects Post Grid Combo – 36+ Gutenberg Blocks: from n/a through 2.2.50.


We have discovered 1 live websites that are affected by CVE-2023-40211.

Contact us to get more info




Affected Software

Product  Post Grid
Category Wordpress Plugins
Vulnerable Domains1 live websites (0.96% of Post Grid install base)
Vulnerable Versions
  • from 0 through 2.2.50
Vulnerable Versions Count1 versions ( 2.00% of all versions)


Common Weakness Enumeration

CWE-200 Exposure of Sensitive Information to an Unauthorized Actor



Details

  • Published - Nov 30, 2023
  • Updated - Aug 2, 2024

Credits

  • Mika (Patchstack Alliance) (finder)

CVE-2023-40211 usage by Country

United States1 websites

CVE-2023-40211 usage by TLD

.com1 websites

Vulnerable Versions

Vulnerable versions are highlighted in red

Websites affected by CVE-2023-40211

Top websites that are affected by CVE-2023-40211. Please click on the "Contact us" link to get more information.
DomainCountryRankContacts
******.com United States**,***,***
See full domain list

FAQ

CVE-2023-40211 is Exposure of Sensitive Information to an Unauthorized Actor in Post Grid
A total of 1 websites have been identified as vulnerable to CVE-2023-40211, discovered through global website indexing conducted by WebTechSurvey.
Post Grid is susceptible to CVE-2023-40211 vulnerability.
Post Grid versions before, and including, 2.2.50 are vulnerable to CVE-2023-40211.