Description

The Spacer plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the motech_spacer_callback() function in all versions up to, and including, 3.0.7. This makes it possible for authenticated attackers, with Subscriber-level access and above, to view limited setting information.

INFO

Published Date :

2025-01-07T04:21:55.254Z

Last Modified :

2026-04-08T16:36:13.166Z

Source :

Wordfence
AFFECTED PRODUCTS

The following products are affected by CVE-2024-10527 vulnerability.

Vendors Products
Clevelandwebdeveloper
  • Spacer
Wordpress
  • Wordpress
REFERENCES

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact