Input validation vulnerability in Content Blocks (Custom Post Widget) 3.3.0

The Content Blocks plugin for WordPress has a security issue called Local File Inclusion. This means that someone who is logged in and has contributor-level access or higher can include and run any file on the server. This could be used to get around security measures, get private information, or run code from files that are normally considered safe.

Detected in:

Content Blocks (Custom Post Widget) fixed vulnerable versions: >= * <= 3.3.0

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.