The Breakdance plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 1.7.1 via post meta data. This is due to the plugin storing custom data in metadata without an underscore prefix. This makes it possible for lower privileged users, such as contributors, to edit this data via UI. As a result they can escalate their privileges or execute arbitrary code.

Project Subscriptions

Vendors Products
Breakdance Subscribe
Breakdance Subscribe
Wordpress Subscribe
Wordpress Subscribe
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 08 Apr 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 08 Apr 2026 17:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-94

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:34:27.572Z

Reserved: 2024-05-07T12:33:02.570Z

Link: CVE-2024-4605

cve-icon Vulnrichment

Updated: 2024-08-01T20:47:41.321Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-05-14T15:44:11.683

Modified: 2026-04-08T17:18:56.013

Link: CVE-2024-4605

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-07-12T22:00:57Z

Weaknesses