Spectra Vulnerability – WordPress Gutenberg Blocks – Authenticated Path Traversal – CVE-2024-3107 | WordPress Plugin Vulnerability Report

Plugin Name: Spectra – WordPress Gutenberg Blocks

Key Information:

  • Software Type: Plugin
  • Software Slug: ultimate-addons-for-gutenberg
  • Software Status: Active
  • Software Author: brainstormforce
  • Software Downloads: 21,536,049
  • Active Installs: 700,000
  • Last Updated: May 12, 2024
  • Patched Versions: 2.12.7
  • Affected Versions: <= 2.12.6

Vulnerability Details:

  • Name: Spectra – WordPress Gutenberg Blocks <= 2.12.6
  • Title: Authenticated (Contributor+) Path Traversal
  • Type: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
  • CVE: CVE-2024-3107
  • CVSS Score: 4.3
  • Publicly Published: April 26, 2024
  • Researcher: Ngô Thiên An (ancorn_) - VNPT-VCI
  • Description: The Spectra – WordPress Gutenberg Blocks plugin for WordPress exhibits a path traversal vulnerability in versions up to and including 2.12.6. Through the 'get_block_default_attributes' function, authenticated attackers with contributor-level access can exploit this vulnerability to read contents of any 'attributes.php' files located on the server, potentially accessing sensitive information.


The Spectra plugin for WordPress, used extensively to enhance Gutenberg blocks, has a vulnerability in versions up to and including 2.12.6 that allows authenticated users to exploit a path traversal flaw. This security issue has been resolved in the recently released version 2.12.7.

Detailed Overview:

This vulnerability allows attackers with at least contributor privileges to read files that could contain sensitive data, compromising site security. The risk, although moderate with a CVSS score of 4.3, underscores the need for stringent file and directory access permissions and vigilant monitoring of user roles and capabilities within WordPress. The patch in version 2.12.7 rectifies this by securing the paths that can be accessed through the function involved.

Advice for Users:

  • Immediate Action: Update to version 2.12.7 immediately to mitigate the risk posed by this vulnerability.
  • Check for Signs of Vulnerability: Review server logs and WordPress user activity to detect any unusual access patterns or file access that might suggest exploitation.
  • Alternate Plugins: While the updated version is secure, users who are particularly concerned about security may consider alternative Gutenberg block plugins until confident in the patched version's efficacy.
  • Stay Updated: Regularly updating your plugins and WordPress core is crucial to maintaining security against known vulnerabilities.


The quick action by Brainstorm Force to patch this vulnerability in Spectra – WordPress Gutenberg Blocks highlights the critical nature of maintaining up-to-date software on your WordPress site. By ensuring that you have installed version 2.12.7 or later, you safeguard your website against potential exploitation of this path traversal vulnerability.


Detailed Report: 

In today's digital ecosystem, maintaining the integrity of your WordPress site is not just about content and SEO but critically hinges on the security measures in place. The recent discovery of a security vulnerability in the widely-used Spectra – WordPress Gutenberg Blocks plugin, designated as CVE-2024-3107, serves as a critical reminder of why keeping your website's components updated is not just recommended but essential.

Vulnerability Details

CVE-2024-3107 is a path traversal vulnerability found in versions up to and including 2.12.6 of the Spectra plugin. Discovered by Ngô Thiên An from VNPT-VCI, this flaw allows authenticated users with contributor-level access to exploit the get_block_default_attributes function to read sensitive attributes.php files located on the server. Such access could potentially expose sensitive data, highlighting significant security concerns.

Impact and Risks

The vulnerability poses a moderate risk, primarily affecting the confidentiality of data on the WordPress site. Attackers could access sensitive information that could be used to further compromise the site or its data. The specific nature of the vulnerability means that it cannot directly modify or delete data but can lead to unauthorized data access.

Remediation Steps

The developers at Brainstorm Force have addressed this vulnerability in the version 2.12.7 update of the Spectra plugin. It is crucial for users to:

  • Update immediately to version 2.12.7, which patches this vulnerability.
  • Review server logs and WordPress user activities for any signs of unauthorized access or unusual patterns indicating that the vulnerability might have been exploited.
  • Regularly update all plugins and themes to their latest versions to protect against known vulnerabilities.

Overview of Previous Vulnerabilities

This is not the first challenge for the Spectra plugin. With 14 previous vulnerabilities reported since March 30, 2020, the plugin's history underlines the continuous need for vigilance and timely updates to secure your digital platforms against evolving threats.


The swift response by the plugin developers to release a patch for CVE-2024-3107 underscores the critical nature of timely software updates in maintaining a secure WordPress environment. For small business owners, who often juggle multiple responsibilities, understanding the importance of such updates is key. Engaging with automated security services, scheduling regular updates, and monitoring site activity can vastly reduce the risk of vulnerabilities while allowing business owners to focus on their core operations.

Ensuring your site's plugins are always up-to-date is not just about enhancing functionality—it's a vital part of protecting your business from cyber threats. As digital landscapes evolve, so too do the tactics of those looking to exploit any security lapses. Proactive security management remains your best defense.

Staying Secure

Staying on top of WordPress security can feel overwhelming for small business owners without dedicated IT staff. At Your WP Guy, we exist to shoulder that burden for you. Our WordPress experts can fully audit, secure, maintain and support your site - so you can focus on growing your business with peace of mind.

Don't tackle security risks alone. Let us help you assess any impact from this vulnerability, update your plugins, and implement ongoing maintenance to avoid future threats. We treat your website like it's our own - because we know how critical it is for reaching your customers.

Get in touch for a free consultation today on making WordPress security stress-free. Call 678-995-5169 or book a call here. Our knowledgeable team is ready to help you safeguard your online presence.

Spectra Vulnerability – WordPress Gutenberg Blocks – Authenticated Path Traversal – CVE-2024-3107 | WordPress Plugin Vulnerability Report FAQs

Leave a Comment